9.1

CVE-2024-22122

Zabbix allows to configure SMS notifications. AT command injection occurs on "Zabbix Server" because there is no validation of "Number" field on Web nor on Zabbix server side. Attacker can run test of SMS providing specially crafted phone number and execute additional AT commands on modem.

Data is provided by the National Vulnerability Database (NVD)
ZabbixZabbix Version >= 5.0.0 <= 5.0.42
ZabbixZabbix Version >= 6.0.0 <= 6.0.30
ZabbixZabbix Version >= 6.4.0 <= 6.4.15
ZabbixZabbix Version7.0.0 Updatealpha1
ZabbixZabbix Version7.0.0 Updatealpha2
ZabbixZabbix Version7.0.0 Updatealpha3
ZabbixZabbix Version7.0.0 Updatealpha4
ZabbixZabbix Version7.0.0 Updatealpha5
ZabbixZabbix Version7.0.0 Updatealpha6
ZabbixZabbix Version7.0.0 Updatealpha7
ZabbixZabbix Version7.0.0 Updatealpha8
ZabbixZabbix Version7.0.0 Updatealpha9
ZabbixZabbix Version7.0.0 Updatebeta1
ZabbixZabbix Version7.0.0 Updatebeta2
ZabbixZabbix Version7.0.0 Updatebeta3
ZabbixZabbix Version7.0.0 Updaterc1
ZabbixZabbix Version7.0.0 Updaterc2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.2% 0.427
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 9.1 2.3 6
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
security@zabbix.com 3 1.3 1.4
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:N
CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')

The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.