{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-27T14:20:11.413","vulnerabilities":[{"cve":{"id":"CVE-2022-48321","sourceIdentifier":"security@checkmk.com","published":"2023-02-20T17:15:12.607","lastModified":"2024-11-21T07:33:09.557","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Limited Server-Side Request Forgery (SSRF) in agent-receiver in Tribe29's Checkmk <= 2.1.0p11 allows an attacker to communicate with local network restricted endpoints by use of the host registration API."}],"metrics":{"cvssMetricV31":[{"source":"security@checkmk.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L","baseScore":6.8,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":2.5,"impactScore":3.7},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","baseScore":3.3,"baseSeverity":"LOW","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":1.8,"impactScore":1.4}]},"weaknesses":[{"source":"security@checkmk.com","type":"Secondary","description":[{"lang":"en","value":"CWE-20"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-918"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:checkmk:checkmk:2.1.0:-:*:*:*:*:*:*","matchCriteriaId":"1AE224D8-742B-4D1F-ABBE-3DDA3EA5C5AD"},{"vulnerable":true,"criteria":"cpe:2.3:a:checkmk:checkmk:2.1.0:b1:*:*:*:*:*:*","matchCriteriaId":"1E6FCE7B-7ECE-42A4-82C5-12A647B0CCC8"},{"vulnerable":true,"criteria":"cpe:2.3:a:checkmk:checkmk:2.1.0:b2:*:*:*:*:*:*","matchCriteriaId":"923AA113-D5E7-4F78-88BA-B72EF250F3EA"},{"vulnerable":true,"criteria":"cpe:2.3:a:checkmk:checkmk:2.1.0:b3:*:*:*:*:*:*","matchCriteriaId":"B1984F57-A313-48AC-B8F9-F352D82824D6"},{"vulnerable":true,"criteria":"cpe:2.3:a:checkmk:checkmk:2.1.0:b4:*:*:*:*:*:*","matchCriteriaId":"A38DB527-72A6-40B8-B46F-B8E78BFFDB1F"},{"vulnerable":true,"criteria":"cpe:2.3:a:checkmk:checkmk:2.1.0:b5:*:*:*:*:*:*","matchCriteriaId":"67643E11-91A1-4580-BC4C-574074C862CB"},{"vulnerable":true,"criteria":"cpe:2.3:a:checkmk:checkmk:2.1.0:b6:*:*:*:*:*:*","matchCriteriaId":"350B7E0F-D234-4D7C-91E4-F35E73579A24"},{"vulnerable":true,"criteria":"cpe:2.3:a:checkmk:checkmk:2.1.0:b7:*:*:*:*:*:*","matchCriteriaId":"DE58ACA9-8078-46A7-8487-C06E4E38F372"},{"vulnerable":true,"criteria":"cpe:2.3:a:checkmk:checkmk:2.1.0:b8:*:*:*:*:*:*","matchCriteriaId":"B3D8CF4D-E1F8-4D8D-A8A9-1783CAC869E4"},{"vulnerable":true,"criteria":"cpe:2.3:a:checkmk:checkmk:2.1.0:b9:*:*:*:*:*:*","matchCriteriaId":"58B0B051-7D3C-4EC7-96B0-38A1CC108D61"},{"vulnerable":true,"criteria":"cpe:2.3:a:checkmk:checkmk:2.1.0:p1:*:*:*:*:*:*","matchCriteriaId":"B783A741-AAF2-43EE-8272-9239133A01E8"},{"vulnerable":true,"criteria":"cpe:2.3:a:checkmk:checkmk:2.1.0:p10:*:*:*:*:*:*","matchCriteriaId":"A5F275A3-A99E-40E1-BD77-694FA568541F"},{"vulnerable":true,"criteria":"cpe:2.3:a:checkmk:checkmk:2.1.0:p11:*:*:*:*:*:*","matchCriteriaId":"3A44BF1A-5BE0-4412-B51D-055445758B61"},{"vulnerable":true,"criteria":"cpe:2.3:a:checkmk:checkmk:2.1.0:p2:*:*:*:*:*:*","matchCriteriaId":"4DA8F776-A724-48FC-B7EF-13788BC69753"},{"vulnerable":true,"criteria":"cpe:2.3:a:checkmk:checkmk:2.1.0:p3:*:*:*:*:*:*","matchCriteriaId":"076463AA-195F-4CD6-861B-72FE1C8A407F"},{"vulnerable":true,"criteria":"cpe:2.3:a:checkmk:checkmk:2.1.0:p4:*:*:*:*:*:*","matchCriteriaId":"63043834-98E5-47C2-91F1-41B98270ABCA"},{"vulnerable":true,"criteria":"cpe:2.3:a:checkmk:checkmk:2.1.0:p5:*:*:*:*:*:*","matchCriteriaId":"FCF745D0-2EA6-4414-90BC-99D3ED08BB01"},{"vulnerable":true,"criteria":"cpe:2.3:a:checkmk:checkmk:2.1.0:p6:*:*:*:*:*:*","matchCriteriaId":"4823087F-D7FA-4594-8FD3-412DE5EA1F02"},{"vulnerable":true,"criteria":"cpe:2.3:a:checkmk:checkmk:2.1.0:p7:*:*:*:*:*:*","matchCriteriaId":"6429F9CE-D477-4CFF-B6E0-4BF11B61ED0E"},{"vulnerable":true,"criteria":"cpe:2.3:a:checkmk:checkmk:2.1.0:p8:*:*:*:*:*:*","matchCriteriaId":"A50C58F9-94ED-4D85-8331-2D81F8E0760A"},{"vulnerable":true,"criteria":"cpe:2.3:a:checkmk:checkmk:2.1.0:p9:*:*:*:*:*:*","matchCriteriaId":"9A6AC0BD-FB65-4FAA-B344-66F87F16F8B3"}]}]}],"references":[{"url":"https://checkmk.com/werk/14385","source":"security@checkmk.com","tags":["Mitigation","Vendor Advisory"]},{"url":"https://www.sonarsource.com/blog/checkmk-rce-chain-1/","source":"security@checkmk.com","tags":["Exploit","Third Party Advisory"]},{"url":"https://checkmk.com/werk/14385","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mitigation","Vendor Advisory"]},{"url":"https://www.sonarsource.com/blog/checkmk-rce-chain-1/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]}]}}]}