Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2025-64998

Summary
Assigner-Checkmk
Assigner Org ID-f7d6281c-4801-44ce-ace2-493291dedb0f
Published At-24 Mar, 2026 | 11:25
Updated At-25 Mar, 2026 | 03:55
Rejected At-
Credits

Session hijacking via exposed session signing secret in distributed Checkmk setups

Exposure of session signing secret in Checkmk <2.4.0p23, <2.3.0p45 and 2.2.0 allows an administrator of a remote site with config sync enabled to hijack sessions on the central site by forging session cookies.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
â–¼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:Checkmk
Assigner Org ID:f7d6281c-4801-44ce-ace2-493291dedb0f
Published At:24 Mar, 2026 | 11:25
Updated At:25 Mar, 2026 | 03:55
Rejected At:
â–¼CVE Numbering Authority (CNA)
Session hijacking via exposed session signing secret in distributed Checkmk setups

Exposure of session signing secret in Checkmk <2.4.0p23, <2.3.0p45 and 2.2.0 allows an administrator of a remote site with config sync enabled to hijack sessions on the central site by forging session cookies.

Affected Products
Vendor
Checkmk GmbHCheckmk GmbH
Product
Checkmk
Default Status
unaffected
Versions
Affected
  • From 2.4.0 before 2.4.0p23 (semver)
  • From 2.3.0 before 2.3.0p45 (semver)
  • 2.2.0 (semver)
Problem Types
TypeCWE IDDescription
CWECWE-522CWE-522: Insufficiently Protected Credentials
Type: CWE
CWE ID: CWE-522
Description: CWE-522: Insufficiently Protected Credentials
Metrics
VersionBase scoreBase severityVector
4.07.3HIGH
CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Version: 4.0
Base score: 7.3
Base severity: HIGH
Vector:
CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Metrics Other Info
Impacts
CAPEC IDDescription
CAPEC-196CAPEC-196: Session Credential Falsification through Forging
CAPEC ID: CAPEC-196
Description: CAPEC-196: Session Credential Falsification through Forging
Solutions

Configurations

Workarounds

Exploits

Credits

reporter
Lisa Gnedt (SBA Research)
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://checkmk.com/werk/18954
vendor-advisory
Hyperlink: https://checkmk.com/werk/18954
Resource:
vendor-advisory
â–¼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
â–¼National Vulnerability Database (NVD)
nvd.nist.gov
Source:security@checkmk.com
Published At:24 Mar, 2026 | 12:16
Updated At:12 May, 2026 | 13:34

Exposure of session signing secret in Checkmk <2.4.0p23, <2.3.0p45 and 2.2.0 allows an administrator of a remote site with config sync enabled to hijack sessions on the central site by forging session cookies.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary4.07.3HIGH
CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Primary3.17.2HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 4.0
Base score: 7.3
Base severity: HIGH
Vector:
CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Type: Primary
Version: 3.1
Base score: 7.2
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CPE Matches

Checkmk GmbH
checkmk
>>checkmk>>2.2.0
cpe:2.3:a:checkmk:checkmk:2.2.0:-:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.2.0
cpe:2.3:a:checkmk:checkmk:2.2.0:b1:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.2.0
cpe:2.3:a:checkmk:checkmk:2.2.0:b2:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.2.0
cpe:2.3:a:checkmk:checkmk:2.2.0:b3:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.2.0
cpe:2.3:a:checkmk:checkmk:2.2.0:b4:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.2.0
cpe:2.3:a:checkmk:checkmk:2.2.0:b5:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.2.0
cpe:2.3:a:checkmk:checkmk:2.2.0:b6:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.2.0
cpe:2.3:a:checkmk:checkmk:2.2.0:b7:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.2.0
cpe:2.3:a:checkmk:checkmk:2.2.0:b8:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.2.0
cpe:2.3:a:checkmk:checkmk:2.2.0:i1:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.2.0
cpe:2.3:a:checkmk:checkmk:2.2.0:p1:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.2.0
cpe:2.3:a:checkmk:checkmk:2.2.0:p10:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.2.0
cpe:2.3:a:checkmk:checkmk:2.2.0:p11:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.2.0
cpe:2.3:a:checkmk:checkmk:2.2.0:p12:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.2.0
cpe:2.3:a:checkmk:checkmk:2.2.0:p13:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.2.0
cpe:2.3:a:checkmk:checkmk:2.2.0:p14:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.2.0
cpe:2.3:a:checkmk:checkmk:2.2.0:p15:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.2.0
cpe:2.3:a:checkmk:checkmk:2.2.0:p16:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.2.0
cpe:2.3:a:checkmk:checkmk:2.2.0:p17:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.2.0
cpe:2.3:a:checkmk:checkmk:2.2.0:p18:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.2.0
cpe:2.3:a:checkmk:checkmk:2.2.0:p19:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.2.0
cpe:2.3:a:checkmk:checkmk:2.2.0:p2:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.2.0
cpe:2.3:a:checkmk:checkmk:2.2.0:p20:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.2.0
cpe:2.3:a:checkmk:checkmk:2.2.0:p21:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.2.0
cpe:2.3:a:checkmk:checkmk:2.2.0:p22:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.2.0
cpe:2.3:a:checkmk:checkmk:2.2.0:p23:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.2.0
cpe:2.3:a:checkmk:checkmk:2.2.0:p24:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.2.0
cpe:2.3:a:checkmk:checkmk:2.2.0:p25:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.2.0
cpe:2.3:a:checkmk:checkmk:2.2.0:p26:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.2.0
cpe:2.3:a:checkmk:checkmk:2.2.0:p27:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.2.0
cpe:2.3:a:checkmk:checkmk:2.2.0:p28:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.2.0
cpe:2.3:a:checkmk:checkmk:2.2.0:p29:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.2.0
cpe:2.3:a:checkmk:checkmk:2.2.0:p3:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.2.0
cpe:2.3:a:checkmk:checkmk:2.2.0:p30:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.2.0
cpe:2.3:a:checkmk:checkmk:2.2.0:p31:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.2.0
cpe:2.3:a:checkmk:checkmk:2.2.0:p32:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.2.0
cpe:2.3:a:checkmk:checkmk:2.2.0:p33:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.2.0
cpe:2.3:a:checkmk:checkmk:2.2.0:p34:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.2.0
cpe:2.3:a:checkmk:checkmk:2.2.0:p35:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.2.0
cpe:2.3:a:checkmk:checkmk:2.2.0:p36:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.2.0
cpe:2.3:a:checkmk:checkmk:2.2.0:p37:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.2.0
cpe:2.3:a:checkmk:checkmk:2.2.0:p38:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.2.0
cpe:2.3:a:checkmk:checkmk:2.2.0:p39:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.2.0
cpe:2.3:a:checkmk:checkmk:2.2.0:p4:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.2.0
cpe:2.3:a:checkmk:checkmk:2.2.0:p40:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.2.0
cpe:2.3:a:checkmk:checkmk:2.2.0:p41:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.2.0
cpe:2.3:a:checkmk:checkmk:2.2.0:p42:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.2.0
cpe:2.3:a:checkmk:checkmk:2.2.0:p43:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.2.0
cpe:2.3:a:checkmk:checkmk:2.2.0:p44:*:*:*:*:*:*
Checkmk GmbH
checkmk
>>checkmk>>2.2.0
cpe:2.3:a:checkmk:checkmk:2.2.0:p45:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-522Secondarysecurity@checkmk.com
CWE ID: CWE-522
Type: Secondary
Source: security@checkmk.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://checkmk.com/werk/18954security@checkmk.com
Vendor Advisory
Hyperlink: https://checkmk.com/werk/18954
Source: security@checkmk.com
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

8Records found

CVE-2023-37362
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-7.2||HIGH
EPSS-0.07% / 21.49%
||
7 Day CHG~0.00%
Published-19 Jul, 2023 | 21:50
Updated-06 Mar, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Weintek Weincloud Improper Authentication

Weintek Weincloud v0.13.6 could allow an attacker to abuse the registration functionality to login with testing credentials to the official website.

Action-Not Available
Vendor-weintekWeintek
Product-weincloudWeincloud
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2023-32268
Matching Score-4
Assigner-OpenText (formerly Micro Focus)
ShareView Details
Matching Score-4
Assigner-OpenText (formerly Micro Focus)
CVSS Score-7.2||HIGH
EPSS-0.07% / 20.39%
||
7 Day CHG~0.00%
Published-06 Dec, 2023 | 13:29
Updated-02 Aug, 2024 | 15:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Administrator equivalent Filr user can access proxy administrator credentials

Exposure of Proxy Administrator Credentials An authenticated administrator equivalent Filr user can access the credentials of proxy administrators.

Action-Not Available
Vendor-Micro Focus International LimitedOpen Text Corporation
Product-filrFilr
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2019-6549
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-7.2||HIGH
EPSS-0.09% / 25.45%
||
7 Day CHG~0.00%
Published-12 Feb, 2019 | 18:00
Updated-16 Sep, 2024 | 22:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An attacker could retrieve plain-text credentials stored in a XML file on PR100088 Modbus gateway versions prior to Release R02 (or Software Version 1.1.13166) through FTP.

Action-Not Available
Vendor-ICS-CERTKUNBUS GmbH
Product-pr100088_modbus_gateway_firmwarepr100088_modbus_gatewayPR100088 Modbus gateway
CWE ID-CWE-312
Cleartext Storage of Sensitive Information
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2023-25407
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.42% / 61.93%
||
7 Day CHG~0.00%
Published-11 Apr, 2023 | 00:00
Updated-11 Feb, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Aten PE8108 2.4.232 is vulnerable to Incorrect Access Control. Restricted users have read access to administrator credentials.

Action-Not Available
Vendor-atenn/a
Product-pe8108_firmwarepe8108n/a
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2020-11629
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.22% / 44.83%
||
7 Day CHG~0.00%
Published-07 Apr, 2020 | 23:34
Updated-04 Aug, 2024 | 11:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in EJBCA before 6.15.2.6 and 7.x before 7.3.1.2. The External Command Certificate Validator, which allows administrators to upload external linters to validate certificates, is supposed to save uploaded test certificates to the server. An attacker who has gained access to the CA UI could exploit this to upload malicious scripts to the server. (Risks associated with this issue alone are negligible unless a malicious user already has gained access to the CA UI through other means, as a trusted user is already trusted to upload scripts by virtue of having access to the validator.)

Action-Not Available
Vendor-primekeyn/a
Product-ejbcan/a
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2021-35529
Matching Score-4
Assigner-Hitachi Energy
ShareView Details
Matching Score-4
Assigner-Hitachi Energy
CVSS Score-7.7||HIGH
EPSS-0.29% / 52.85%
||
7 Day CHG~0.00%
Published-20 Aug, 2021 | 17:35
Updated-17 Sep, 2024 | 02:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Password in Memory Vulnerability in Retail Operations Product and Counterparty Settlement and Billing (CSB)

Insufficiently Protected Credentials vulnerability in client environment of Hitachi ABB Power Grids Retail Operations and Counterparty Settlement Billing (CSB) allows an attacker or unauthorized user to access database credentials, shut down the product and access or alter. This issue affects: Hitachi ABB Power Grids Retail Operations version 5.7.2 and prior versions. Hitachi ABB Power Grids Counterparty Settlement Billing (CSB) version 5.7.2 and prior versions.

Action-Not Available
Vendor-Hitachi Energy Ltd.Hitachi, Ltd.
Product-retail_operationscounterparty_settlement_and_billingRetail OperationsCounterparty Settlement and Billing (CSB)
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2024-46480
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.4||HIGH
EPSS-0.18% / 39.20%
||
7 Day CHG~0.00%
Published-13 Jan, 2025 | 00:00
Updated-03 Oct, 2025 | 13:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An NTLM hash leak in Venki Supravizio BPM up to 18.0.1 allows authenticated attackers with Application Administrator access to escalate privileges on the underlying host system.

Action-Not Available
Vendor-venkiVenki
Product-supravizio_bpmSupravizio BPM
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2020-2499
Matching Score-4
Assigner-QNAP Systems, Inc.
ShareView Details
Matching Score-4
Assigner-QNAP Systems, Inc.
CVSS Score-6.3||MEDIUM
EPSS-0.20% / 41.67%
||
7 Day CHG~0.00%
Published-24 Dec, 2020 | 01:38
Updated-17 Sep, 2024 | 03:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Hard-coded Password Vulnerability in QES

A hard-coded password vulnerability has been reported to affect earlier versions of QES. If exploited, this vulnerability could allow attackers to log in with a hard-coded password. QNAP has already fixed the issue in QES 2.1.1 Build 20200515 and later.

Action-Not Available
Vendor-QNAP Systems, Inc.
Product-qesQES
CWE ID-CWE-798
Use of Hard-coded Credentials
CWE ID-CWE-522
Insufficiently Protected Credentials
CWE ID-CWE-259
Use of Hard-coded Password
Details not found