CVE-2024-38865

📊 6.0 MEDIUM0.1%🎯 0 exploits
📅 Published Apr 10, 2025
📋 Status: Analyzed

Improper neutralization of livestatus command delimiters in a specific endpoint within RestAPI of Checkmk prior to 2.2.0p39, 2.3.0p25, and 2.1.0p51 (EOL) allows arbitrary livestatus command execution. Exploitation requires the attacker to have a contact group assigned to their user account and for an event to originate from a host with the same contact group or from an event generated with an unknown host.

🎯 Affected Products & Systems

144 product configurations affected

Filter by type:
📱
Application
Vulnerable
Version: < 2.1.0
CPE:
cpe:2.3:a:checkmk:checkmk:*:*:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.1.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.1.0:-:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.1.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.1.0:b1:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.1.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.1.0:b2:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.1.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.1.0:b3:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.1.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.1.0:b4:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.1.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.1.0:b5:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.1.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.1.0:b6:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.1.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.1.0:b7:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.1.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.1.0:b8:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.1.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.1.0:b9:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.1.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.1.0:p1:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.1.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.1.0:p10:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.1.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.1.0:p11:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.1.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.1.0:p12:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.1.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.1.0:p13:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.1.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.1.0:p14:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.1.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.1.0:p15:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.1.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.1.0:p16:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.1.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.1.0:p17:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.1.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.1.0:p18:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.1.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.1.0:p19:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.1.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.1.0:p2:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.1.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.1.0:p20:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.1.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.1.0:p21:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.1.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.1.0:p22:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.1.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.1.0:p23:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.1.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.1.0:p24:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.1.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.1.0:p25:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.1.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.1.0:p26:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.1.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.1.0:p27:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.1.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.1.0:p28:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.1.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.1.0:p29:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.1.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.1.0:p3:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.1.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.1.0:p30:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.1.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.1.0:p31:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.1.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.1.0:p32:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.1.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.1.0:p33:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.1.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.1.0:p34:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.1.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.1.0:p35:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.1.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.1.0:p36:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.1.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.1.0:p37:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.1.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.1.0:p38:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.1.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.1.0:p39:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.1.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.1.0:p4:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.1.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.1.0:p40:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.1.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.1.0:p41:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.1.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.1.0:p42:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.1.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.1.0:p43:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.1.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.1.0:p44:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.1.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.1.0:p45:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.1.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.1.0:p46:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.1.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.1.0:p47:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.1.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.1.0:p48:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.1.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.1.0:p49:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.1.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.1.0:p5:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.1.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.1.0:p50:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.1.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.1.0:p6:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.1.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.1.0:p7:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.1.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.1.0:p8:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.1.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.1.0:p9:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.2.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.2.0:-:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.2.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.2.0:b1:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.2.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.2.0:b2:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.2.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.2.0:b3:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.2.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.2.0:b4:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.2.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.2.0:b5:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.2.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.2.0:b6:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.2.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.2.0:b7:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.2.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.2.0:b8:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.2.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.2.0:i1:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.2.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.2.0:p1:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.2.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.2.0:p10:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.2.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.2.0:p11:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.2.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.2.0:p12:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.2.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.2.0:p13:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.2.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.2.0:p14:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.2.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.2.0:p15:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.2.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.2.0:p16:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.2.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.2.0:p17:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.2.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.2.0:p18:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.2.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.2.0:p19:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.2.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.2.0:p2:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.2.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.2.0:p20:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.2.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.2.0:p21:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.2.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.2.0:p22:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.2.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.2.0:p23:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.2.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.2.0:p24:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.2.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.2.0:p25:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.2.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.2.0:p26:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.2.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.2.0:p27:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.2.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.2.0:p28:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.2.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.2.0:p29:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.2.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.2.0:p3:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.2.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.2.0:p30:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.2.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.2.0:p31:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.2.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.2.0:p32:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.2.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.2.0:p33:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.2.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.2.0:p34:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.2.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.2.0:p35:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.2.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.2.0:p36:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.2.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.2.0:p37:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.2.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.2.0:p38:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.2.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.2.0:p4:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.2.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.2.0:p40:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.2.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.2.0:p5:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.2.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.2.0:p6:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.2.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.2.0:p7:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.2.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.2.0:p8:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.2.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.2.0:p9:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.3.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.3.0:*:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.3.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.3.0:-:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.3.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.3.0:b1:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.3.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.3.0:b2:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.3.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.3.0:b3:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.3.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.3.0:b4:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.3.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.3.0:b5:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.3.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.3.0:b6:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.3.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.3.0:p1:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.3.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.3.0:p10:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.3.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.3.0:p11:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.3.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.3.0:p12:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.3.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.3.0:p13:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.3.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.3.0:p14:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.3.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.3.0:p15:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.3.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.3.0:p16:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.3.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.3.0:p17:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.3.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.3.0:p18:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.3.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.3.0:p19:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.3.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.3.0:p2:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.3.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.3.0:p20:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.3.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.3.0:p21:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.3.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.3.0:p22:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.3.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.3.0:p23:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.3.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.3.0:p24:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.3.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.3.0:p28:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.3.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.3.0:p29:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.3.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.3.0:p3:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.3.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.3.0:p4:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.3.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.3.0:p5:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.3.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.3.0:p6:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.3.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.3.0:p7:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.3.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.3.0:p8:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 2.3.0
CPE:
cpe:2.3:a:checkmk:checkmk:2.3.0:p9:*:*:*:*:*:*
144 productsscroll for more
Metrics
6.0 MEDIUMCVSS v4.0[email protected]
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

🔍 Technical Details

Analysis Status
Analyzed
CVSS Details
6.0 (MEDIUM)v4.0
EPSS Details
0.1% (Minimal)27.7th percentile
Last updated: Oct 31, 2025
Exploitation probability within 30 days
Published Date
Apr 10, 2025 (6 months ago)
Last Modified
Aug 21, 2025 (2 months ago)
Security Weaknesses1
References2