CVE-2023-32728Improper Input Validation in Zabbix

Severity
9.8CRITICALNVD
CNA4.6
EPSS
0.5%
top 32.50%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 18
Latest updateDec 22

Description

The Zabbix Agent 2 item key smart.disk.get does not sanitize its parameters before passing them to a shell command resulting possible vulnerability for remote code execution.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages4 packages

NVDzabbix/zabbix-agent25.0.05.0.38+3
debiandebian/zabbix< zabbix 1:6.0.24+dfsg-1 (forky)
Debianzabbix/zabbix< 1:6.0.24+dfsg-1+1
CVEListV5zabbix/zabbix5,0,05.0.38+3

🔴Vulnerability Details

3
GHSA
GHSA-c26q-v9gv-jx6m: The Zabbix Agent 2 item key smart2023-12-22
OSV
CVE-2023-32728: The Zabbix Agent 2 item key smart2023-12-18
CVEList
Code injection in zabbix_agent2 smart.disk.get caused by smartctl plugin2023-12-18

📋Vendor Advisories

1
Debian
CVE-2023-32728: zabbix - The Zabbix Agent 2 item key smart.disk.get does not sanitize its parameters befo...2023