⚠ Actively exploited
Added to CISA KEV on 2022-02-22. Federal agencies required to patch by 2022-03-08. Required action: Apply updates per vendor instructions..
CVE-2022-23134 — Improper Access Control in Zabbix
Severity
5.3MEDIUMNVD
CNA3.7VulnCheck3.7
EPSS
93.1%
top 0.21%
CISA KEV
KEV
Added 2022-02-22
Due 2022-03-08
Exploit
Exploited in wild
Active exploitation observed
Affected products
Timeline
PublishedJan 13
KEV addedFeb 22
KEV dueMar 8
CISA Required Action: Apply updates per vendor instructions.
Description
After the initial setup process, some steps of setup.php file are reachable not only by super-administrators, but by unauthenticated users as well. Malicious actor can pass step checks and potentially change the configuration of Zabbix Frontend.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:NExploitability: 3.9 | Impact: 1.4
Affected Packages3 packages
Also affects: Debian Linux 9.0, Fedora 34, 35
Patches
🔴Vulnerability Details
4CVEList
▶
💥Exploits & PoCs
1Nuclei▶
Zabbix Setup Configuration Authentication Bypass