CVE-2024-36464 — Plaintext Storage of a Password in Zabbix
Severity
2.7LOWNVD
EPSS
0.1%
top 79.33%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedNov 27
Description
When exporting media types, the password is exported in the YAML in plain text. This appears to be a best practices type issue and may have no actual impact. The user would need to have permissions to access the media types and therefore would be expected to have access to these passwords.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:NExploitability: 1.2 | Impact: 1.4
Affected Packages3 packages
🔴Vulnerability Details
3OSV▶
CVE-2024-36464: When exporting media types, the password is exported in the YAML in plain text↗2024-11-27
GHSA▶
GHSA-rj72-j8c2-fwx3: When exporting media types, the password is exported in the YAML in plain text↗2024-11-27
CVEList▶
Media Types: Office365, SMTP passwords are unencrypted and visible in plaintext when exported↗2024-11-27
📋Vendor Advisories
1Debian▶
CVE-2024-36464: zabbix - When exporting media types, the password is exported in the YAML in plain text. ...↗2024