5.3

CVE-2022-23134

Warnung

After the initial setup process, some steps of setup.php file are reachable not only by super-administrators, but by unauthenticated users as well. Malicious actor can pass step checks and potentially change the configuration of Zabbix Frontend.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
ZabbixZabbix Version >= 5.4.0 <= 5.4.8
ZabbixZabbix Version6.0.0 Updatealpha1
ZabbixZabbix Version6.0.0 Updatealpha2
ZabbixZabbix Version6.0.0 Updatealpha3
ZabbixZabbix Version6.0.0 Updatealpha4
ZabbixZabbix Version6.0.0 Updatealpha5
ZabbixZabbix Version6.0.0 Updatealpha6
ZabbixZabbix Version6.0.0 Updatealpha7
ZabbixZabbix Version6.0.0 Updatebeta1
FedoraprojectFedora Version34
FedoraprojectFedora Version35
DebianDebian Linux Version9.0

22.02.2022: CISA Known Exploited Vulnerabilities (KEV) Catalog

Zabbix Frontend Improper Access Control Vulnerability

Schwachstelle

Malicious actors can pass step checks and potentially change the configuration of Zabbix Frontend.

Beschreibung

Apply updates per vendor instructions.

Erforderliche Maßnahmen
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 93.08% 0.998
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 5.3 3.9 1.4
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
nvd@nist.gov 5 10 2.9
AV:N/AC:L/Au:N/C:N/I:P/A:N
security@zabbix.com 3.7 2.2 1.4
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
CWE-284 Improper Access Control

The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.

CWE-287 Improper Authentication

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.