Files to be deployed with agents are accessible without authentication in Checkmk 2.1.0, Checkmk 2.2.0, Checkmk 2.3.0 and <Checkmk 2.4.0b6 allows attacker to access files that could contain secrets.
| Software | From | Fixed in |
|---|---|---|
| checkmk / checkmk | 2.1.0 | 2.3.0.x |
| checkmk / checkmk | 2.4.0 | 2.4.0.x |
| checkmk / checkmk | 2.4.0-b1 | 2.4.0-b1.x |
| checkmk / checkmk | 2.4.0-b2 | 2.4.0-b2.x |
| checkmk / checkmk | 2.4.0-b3 | 2.4.0-b3.x |
| checkmk / checkmk | 2.4.0-b4 | 2.4.0-b4.x |
| checkmk / checkmk | 2.4.0-b5 | 2.4.0-b5.x |