Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2023-26035Missing Authorization in Zoneminder

Severity
9.8CRITICALNVD
EPSS
55.7%
top 1.90%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedFeb 25
Latest updateMar 4

Description

ZoneMinder is a free, open source Closed-circuit television software application for Linux which supports IP, USB and Analog cameras. Versions prior to 1.36.33 and 1.37.33 are vulnerable to Unauthenticated Remote Code Execution via Missing Authorization. There are no permissions check on the snapshot action, which expects an id to fetch an existing monitor but can be passed an object to create a new one instead. TriggerOn ends up calling shell_exec using the supplied Id. This issue is fixed in T

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages4 packages

debiandebian/zoneminder< zoneminder 1.36.33+dfsg1-1 (bookworm)
NVDzoneminder/zoneminder1.37.001.37.33+1
Debianzoneminder/zoneminder< 1.36.33+dfsg1-1+2
CVEListV5zoneminder/zoneminder>= 1.37.0, < 1.37.33

Patches

🔴Vulnerability Details

1
OSV
CVE-2023-26035: ZoneMinder is a free, open source Closed-circuit television software application for Linux which supports IP, USB and Analog cameras2023-02-25

💥Exploits & PoCs

2
Metasploit
ZoneMinder Snapshots Command Injection
Nuclei
ZoneMinder Snapshots - Command Injection

🔍Detection Rules

1
Suricata
ET WEB_SPECIFIC_APPS Zoneminder Create Snapshot Command Injection Attempt (CVE-2023-26035)2023-11-15

📋Vendor Advisories

1
Debian
CVE-2023-26035: zoneminder - ZoneMinder is a free, open source Closed-circuit television software application...2023

📄Research Papers

2
arXiv
CAM-LDS: Cyber Attack Manifestations for Automatic Interpretation of System Logs and Security Alerts2026-03-04
arXiv
AttackMate: Realistic Emulation and Automation of Cyber Attack Scenarios Across the Kill Chain2026-01-20