Zabbix

Zabbix

98 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 03.10.2025 11:29:26
  • Zuletzt bearbeitet 06.10.2025 14:56:47

A regular Zabbix user with no permission to the Monitoring -> Problems view is still able to call the problem.view.refresh action and therefore still retrieve a list of active problems.

  • EPSS 0.01%
  • Veröffentlicht 03.10.2025 11:28:43
  • Zuletzt bearbeitet 06.10.2025 14:56:47

In Zabbix Agent and Agent 2 on Windows, the OpenSSL configuration file is loaded from a path writable by low-privileged users, allowing malicious modification and potential local privilege escalation by injecting a DLL.

  • EPSS 0.02%
  • Veröffentlicht 03.10.2025 11:28:09
  • Zuletzt bearbeitet 06.10.2025 14:56:47

A regular Zabbix user can search other users in their user group via Zabbix API by select fields the user does not have access to view. This allows data-mining some field values the user does not have access to.

  • EPSS 0.01%
  • Veröffentlicht 03.10.2025 11:25:14
  • Zuletzt bearbeitet 06.10.2025 14:56:47

The LDAP 'Bind password' value cannot be read after saving, but a Super Admin account can leak it by changing LDAP 'Host' to a rogue LDAP server. To mitigate this, the 'Bind password' value is now reset on 'Host' change.

  • EPSS 0.06%
  • Veröffentlicht 12.09.2025 10:33:46
  • Zuletzt bearbeitet 15.09.2025 15:21:42

A Zabbix adminitrator can inject arbitrary SQL during the autoremoval of hosts by inserting malicious SQL in the 'Visible name' field.

  • EPSS 0.03%
  • Veröffentlicht 12.09.2025 10:33:17
  • Zuletzt bearbeitet 15.09.2025 19:15:34

Due to a bug in Zabbix API, the hostprototype.get method lists all host prototypes to users that do not have any user groups assigned to them.

  • EPSS 0.03%
  • Veröffentlicht 12.09.2025 10:32:36
  • Zuletzt bearbeitet 15.09.2025 15:21:42

Zabbix Agent 2 smartctl plugin does not properly sanitize smart.disk.get parameters, allowing an attacker to inject unexpected arguments into the smartctl command. This can be used to leak the NTLMv2 hash from a Windows system.

  • EPSS 0.1%
  • Veröffentlicht 12.09.2025 10:31:58
  • Zuletzt bearbeitet 15.09.2025 15:21:42

Zabbix Agent 2 smartctl plugin does not properly sanitize smart.disk.get parameters, allowing an attacker to inject unexpected arguments into the smartctl command. In Zabbix 5.0 this allows for remote code execution.

Medienbericht
  • EPSS 0.03%
  • Veröffentlicht 02.04.2025 07:15:41
  • Zuletzt bearbeitet 02.04.2025 14:58:07

Zabbix API user.get returns all users that share common group with the calling user. This includes media and other information, such as login attempts, etc.

Medienbericht
  • EPSS 0.05%
  • Veröffentlicht 02.04.2025 07:15:41
  • Zuletzt bearbeitet 02.04.2025 14:58:07

The endpoint /zabbix.php?action=export.valuemaps suffers from a Cross-Site Scripting vulnerability via the backurl parameter. This is caused by the reflection of user-supplied data without appropriate HTML escaping or output encoding. As a result, a ...