CVE-2022-43515 — Improper Input Validation in Frontend
Severity
9.8CRITICALNVD
CNA5.3
EPSS
0.2%
top 60.24%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 5
Latest updateDec 12
Description
Zabbix Frontend provides a feature that allows admins to maintain the installation and ensure that only certain IP addresses can access it. In this way, any user will not be able to access the Zabbix Frontend while it is being maintained and possible sensitive data will be prevented from being disclosed. An attacker can bypass this protection and access the instance using IP address not listed in the defined range.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9
Affected Packages3 packages
🔴Vulnerability Details
3CVEList▶
X-Forwarded-For header is active by default causes access to Zabbix sites in maintenance mode↗2022-12-12
OSV▶
CVE-2022-43515: Zabbix Frontend provides a feature that allows admins to maintain the installation and ensure that only certain IP addresses can access it↗2022-12-05
GHSA▶
GHSA-hh7f-cch9-52mr: Zabbix Frontend provides a feature that allows admins to maintain the installation and ensure that only certain IP addresses can access it↗2022-12-05
📋Vendor Advisories
1Debian▶
CVE-2022-43515: zabbix - Zabbix Frontend provides a feature that allows admins to maintain the installati...↗2022