Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Checkmk GmbH | Checkmk | 2.2.0 ~ 2.2.0p23 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | None | https://github.com/zhulin837/checkmk_cve-2024-0670 | POC Details |
| 2 | PoC for CVE-2024-0670 | https://github.com/magicrc/CVE-2024-0670 | POC Details |
| 3 | This repository contains an exploit demonstration for CVE-2024-0670, a local privilege escalation vulnerability affecting the CheckMK Agent for Windows. The vulnerability allows a low-privileged user to obtain SYSTEM privileges by abusing writable file paths processed by the MSI repair mechanism. | https://github.com/elsevar11/CVE-2024-0670-CheckMK-Agent-Local-Privilege-Escalation-Exploit | POC Details |
| 4 | Hello friend. This is the key to the kingdom. Advanced LPE exploit for CheckMK (CVE-2024-0670). Abuses insecure file handling for SYSTEM access. Includes surgical persistence module. Written in C++. They thought they were safe. They were wrong. The 5/9 revolution starts with a root shell. > We Are Fsociety_ | https://github.com/fsoc-ghost-0x/Fsociety-CVE-2024-0670-CheckMK-LPE | POC Details |
| 5 | 🔍 Exploit CVE-2024-0670 in CheckMK agents for local privilege escalation using a robust C++ tool designed for security professionals. | https://github.com/Nikopmpm/Fsociety-CVE-2024-0670-CheckMK-LPE | POC Details |
| 6 | 🚀 Utilize this C++ tool for local privilege escalation on CheckMK agents, addressing the CVE-2024-0670 vulnerability effectively. | https://github.com/Nikopmpm/nikopmpm.github.io | POC Details |
| 7 | CheckMK Agent Local Privilege Escalation (PoC) | https://github.com/tralsesec/CVE-2024-0670 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet