Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-0670— Privilege escalation in windows agent

CVSS 8.8 · High EPSS 0.15% · P35
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-0670

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Privilege escalation in windows agent
Source: NVD (National Vulnerability Database)
Vulnerability Description
Privilege escalation in windows agent plugin in Checkmk before 2.2.0p23, 2.1.0p40 and 2.0.0 (EOL) allows local user to escalate privileges
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
对搜索路径元素未加控制
Source: NVD (National Vulnerability Database)
Vulnerability Title
Checkmk 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Checkmk是一个编辑器。 Checkmk存在安全漏洞,该漏洞源于存在权限提升漏洞,允许本地用户升级权限。受影响的产品和版本:Checkmk 2.2.0p23之前版本,2.1.0p40之前版本,2.0.0 (EOL)之前版本。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Checkmk GmbHCheckmk 2.2.0 ~ 2.2.0p23 -

II. Public POCs for CVE-2024-0670

#POC DescriptionSource LinkShenlong Link
1Nonehttps://github.com/zhulin837/checkmk_cve-2024-0670POC Details
2 PoC for CVE-2024-0670https://github.com/magicrc/CVE-2024-0670POC Details
3This repository contains an exploit demonstration for CVE-2024-0670, a local privilege escalation vulnerability affecting the CheckMK Agent for Windows. The vulnerability allows a low-privileged user to obtain SYSTEM privileges by abusing writable file paths processed by the MSI repair mechanism.https://github.com/elsevar11/CVE-2024-0670-CheckMK-Agent-Local-Privilege-Escalation-ExploitPOC Details
4Hello friend. This is the key to the kingdom. Advanced LPE exploit for CheckMK (CVE-2024-0670). Abuses insecure file handling for SYSTEM access. Includes surgical persistence module. Written in C++. They thought they were safe. They were wrong. The 5/9 revolution starts with a root shell. > We Are Fsociety_https://github.com/fsoc-ghost-0x/Fsociety-CVE-2024-0670-CheckMK-LPEPOC Details
5🔍 Exploit CVE-2024-0670 in CheckMK agents for local privilege escalation using a robust C++ tool designed for security professionals.https://github.com/Nikopmpm/Fsociety-CVE-2024-0670-CheckMK-LPEPOC Details
6🚀 Utilize this C++ tool for local privilege escalation on CheckMK agents, addressing the CVE-2024-0670 vulnerability effectively.https://github.com/Nikopmpm/nikopmpm.github.ioPOC Details
7CheckMK Agent Local Privilege Escalation (PoC)https://github.com/tralsesec/CVE-2024-0670POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-0670

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2024-0670

No comments yet


Leave a comment