UBUNTU-CVE-2024-28825

See a problem?
Source
https://ubuntu.com/security/CVE-2024-28825
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-28825.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2024-28825
Related
  • CVE-2024-28825
Published
2024-04-24T12:15:00Z
Modified
2024-10-15T14:14:09Z
Summary
[none]
Details

Improper restriction of excessive authentication attempts on some authentication methods in Checkmk before 2.3.0b5 (beta), 2.2.0p26, 2.1.0p43, and in Checkmk 2.0.0 (EOL) facilitates password brute-forcing.

References

Affected packages

Ubuntu:Pro:16.04:LTS / check-mk

Package

Name
check-mk
Purl
pkg:deb/ubuntu/check-mk?arch=src?distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.2.6p5-1
1.2.6p12-1
1.2.6p12-1ubuntu0.16.04.1
1.2.6p12-1ubuntu0.16.04.1+esm1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:Pro:18.04:LTS / check-mk

Package

Name
check-mk
Purl
pkg:deb/ubuntu/check-mk?arch=src?distro=esm-apps/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.2.8p16-1ubuntu0.1
1.2.8p16-1ubuntu0.2

Ecosystem specific

{
    "ubuntu_priority": "medium"
}