CISA KEV 정보
| 취약점명 | Zabbix Frontend Improper Access Control Vulnerability |
|---|---|
| 설명 | Malicious actors can pass step checks and potentially change the configuration of Zabbix Frontend. |
| 조치사항 | Apply updates per vendor instructions. |
| 랜섬웨어 캠페인 악용 | Unknown |
| CWE | CWE-284 |
| 등록일 (KEV) | 2022-02-22 |
| 조치 기한 | 2022-03-08 |
| 추가 참고 | https://nvd.nist.gov/vuln/detail/CVE-2022-23134 |
NVD 상세 정보
CVSS v3.1: 3.7 LOW
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:NCVSS v2.0: 5.0
AV:N/AC:L/Au:N/C:N/I:P/A:N설명: After the initial setup process, some steps of setup.php file are reachable not only by super-administrators, but by unauthenticated users as well. Malicious actor can pass step checks and potentially change the configuration of Zabbix Frontend.
CWE: CWE-284 | CWE-287
참조
- https://lists.debian.org/debian-lts-announce/2022/02/msg00008.html [Mailing List, Third Party Advisory]
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6SZYHXINBKCY42ITFSNCYE7KCSF33VRA/ [Release Notes]
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VB6W556GVXOKUYTASTDGL3AI7S3SJHX7/ [Release Notes]
- https://support.zabbix.com/browse/ZBX-20384 [Issue Tracking, Patch, Vendor Advisory]
- https://lists.debian.org/debian-lts-announce/2022/02/msg00008.html [Mailing List, Third Party Advisory]
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6SZYHXINBKCY42ITFSNCYE7KCSF33VRA/ [Release Notes]
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VB6W556GVXOKUYTASTDGL3AI7S3SJHX7/ [Release Notes]
- https://support.zabbix.com/browse/ZBX-20384 [Issue Tracking, Patch, Vendor Advisory]
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-23134 [US Government Resource]
This product uses the NVD API but is not endorsed or certified by the NVD.