Through their deep dive into the technical details of this vulnerability chain, SonarSource determined how an attacker can escalate to the Checkmk automation user by exploiting an authenticated arbitrary file read in NagVis. Stefan will discuss the multiple vulnerabilities that were discovered, how they can be prevented, and the risks organizations face if they have yet to address SonarSource’s recommendations.