CVE-2014-5340
The wato component in Check_MK before 1.2.4p4 and 1.2.5 before 1.2.5i4 uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, related to an automation URL.
View on NVDSeverity
N/A
EPSS
Probability of exploitation (next 30 days): 0.0296 (3.0%)
Percentile: 86.6%
EPSS: 2026-05-06
Affects
check_mk_project:check_mkTechnical description
The wato component in Check_MK before 1.2.4p4 and 1.2.5 before 1.2.5i4 uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, related to an automation URL.
Published: 9/2/2014, 2:55:03 PM
Last modified: 5/6/2026, 10:30:45 PM
References
- http://mathias-kettner.de/check_mk_werks.php?werk_id=984
- http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html
- http://rhn.redhat.com/errata/RHSA-2015-1495.html
- http://www.securityfocus.com/archive/1/533180/100/0/threaded
- http://mathias-kettner.de/check_mk_werks.php?werk_id=984
- http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html
- http://rhn.redhat.com/errata/RHSA-2015-1495.html
- http://www.securityfocus.com/archive/1/533180/100/0/threaded