U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2021-40906

Change History

Initial Analysis by NIST 4/04/2022 11:56:27 AM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:tribe29:checkmk:*:*:*:*:*:*:*:* versions from (including) 1.5.0 up to (excluding) 1.6.0
     *cpe:2.3:a:tribe29:checkmk:1.6.0:-:*:*:*:*:*:*
     *cpe:2.3:a:tribe29:checkmk:1.6.0:b1:*:*:*:*:*:*
     *cpe:2.3:a:tribe29:checkmk:1.6.0:b10:*:*:*:*:*:*
     *cpe:2.3:a:tribe29:checkmk:1.6.0:b12:*:*:*:*:*:*
     *cpe:2.3:a:tribe29:checkmk:1.6.0:b3:*:*:*:*:*:*
     *cpe:2.3:a:tribe29:checkmk:1.6.0:b4:*:*:*:*:*:*
     *cpe:2.3:a:tribe29:checkmk:1.6.0:b5:*:*:*:*:*:*
     *cpe:2.3:a:tribe29:checkmk:1.6.0:b9:*:*:*:*:*:*
     *cpe:2.3:a:tribe29:checkmk:1.6.0:p1:*:*:*:*:*:*
     *cpe:2.3:a:tribe29:checkmk:1.6.0:p10:*:*:*:*:*:*
     *cpe:2.3:a:tribe29:checkmk:1.6.0:p11:*:*:*:*:*:*
     *cpe:2.3:a:tribe29:checkmk:1.6.0:p12:*:*:*:*:*:*
     *cpe:2.3:a:tribe29:checkmk:1.6.0:p13:*:*:*:*:*:*
     *cpe:2.3:a:tribe29:checkmk:1.6.0:p14:*:*:*:*:*:*
     *cpe:2.3:a:tribe29:checkmk:1.6.0:p15:*:*:*:*:*:*
     *cpe:2.3:a:tribe29:checkmk:1.6.0:p16:*:*:*:*:*:*
     *cpe:2.3:a:tribe29:checkmk:1.6.0:p19:*:*:*:*:*:*
     *cpe:2.3:a:tribe29:checkmk:1.6.0:p2:*:*:*:*:*:*
     *cpe:2.3:a:tribe29:checkmk:1.6.0:p20:*:*:*:*:*:*
     *cpe:2.3:a:tribe29:checkmk:1.6.0:p21:*:*:*:*:*:*
     *cpe:2.3:a:tribe29:checkmk:1.6.0:p22:*:*:*:*:*:*
     *cpe:2.3:a:tribe29:checkmk:1.6.0:p23:*:*:*:*:*:*
     *cpe:2.3:a:tribe29:checkmk:1.6.0:p24:*:*:*:*:*:*
     *cpe:2.3:a:tribe29:checkmk:1.6.0:p25:*:*:*:*:*:*
     *cpe:2.3:a:tribe29:checkmk:1.6.0:p3:*:*:*:*:*:*
     *cpe:2.3:a:tribe29:checkmk:1.6.0:p4:*:*:*:*:*:*
     *cpe:2.3:a:tribe29:checkmk:1.6.0:p5:*:*:*:*:*:*
     *cpe:2.3:a:tribe29:checkmk:1.6.0:p6:*:*:*:*:*:*
     *cpe:2.3:a:tribe29:checkmk:1.6.0:p7:*:*:*:*:*:*
     *cpe:2.3:a:tribe29:checkmk:1.6.0:p8:*:*:*:*:*:*
     *cpe:2.3:a:tribe29:checkmk:1.6.0:p9:*:*:*:*:*:*
     *cpe:2.3:a:tribe29:checkmk:1.6.0b10:*:*:*:*:*:*:*
     *cpe:2.3:a:tribe29:checkmk:1.6.0b11:*:*:*:*:*:*:*
     *cpe:2.3:a:tribe29:checkmk:1.6.0p10:*:*:*:*:*:*:*
     *cpe:2.3:a:tribe29:checkmk:1.6.0p17:*:*:*:*:*:*:*
     *cpe:2.3:a:tribe29:checkmk:1.6.0p18:*:*:*:*:*:*:*
Added CVSS V2

								
							
							
						
NIST (AV:N/AC:M/Au:N/C:N/I:P/A:N)
Added CVSS V2 Metadata

								
							
							
						
Victim must voluntarily interact with attack mechanism
Added CVSS V3.1

								
							
							
						
NIST AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Added CWE

								
							
							
						
NIST CWE-79
Changed Reference Type
http://checkmk.com No Types Assigned
http://checkmk.com Product
Changed Reference Type
https://github.com/Edgarloyola/CVE-2021-40906 No Types Assigned
https://github.com/Edgarloyola/CVE-2021-40906 Third Party Advisory