22/11/2021
3/8/2024
CVE-2022-23131: Zabbix Frontend Authentication Bypass Vulnerability
First published: Mon Nov 22 2021(Updated: )
In the case of instances where the SAML SSO authentication is enabled (non-default), session data can be modified by a malicious actor, because a user login stored in the session was not verified. Malicious unauthenticated actor may exploit this issue to escalate privileges and gain admin access to Zabbix Frontend. To perform the attack, SAML authentication is required to be enabled and the actor has to know the username of Zabbix user (or use the guest account, which is disabled by default).
Credit: security@zabbix.com security@zabbix.com
Affected Software | Affected Version | How to fix |
---|
Zabbix Zabbix | >=5.4.0<=5.4.8 | |
Zabbix Zabbix | =6.0.0-alpha1 | |
Zabbix Frontend | | |
| >=5.4.0<=5.4.8 | |
| =6.0.0-alpha1 | |
Remedy
To remediate this vulnerability, install the updates or if an immediate update is not possible, follow the presented workarounds.
Never miss a vulnerability like this again
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Frequently Asked Questions
What is the severity of CVE-2022-23131?
The severity of CVE-2022-23131 is critical.
How can a malicious actor exploit CVE-2022-23131?
A malicious actor can exploit CVE-2022-23131 to escalate privileges and gain admin access.
Which software versions are affected by CVE-2022-23131?
Versions 5.4.0 to 5.4.8 of Zabbix Frontend and version 6.0.0-alpha1 of Zabbix are affected by CVE-2022-23131.
Is there a patch available for CVE-2022-23131?
Yes, a patch is available for CVE-2022-23131.
Where can I find more information about CVE-2022-23131?
You can find more information about CVE-2022-23131 at the Zabbix support website: https://support.zabbix.com/browse/ZBX-20350.
- collector/nvd-index
- agent/type
- agent/softwarecombine
- agent/description
- agent/author
- agent/weakness
- agent/title
- collector/mitre-cve
- source/MITRE
- agent/severity
- agent/remedy
- agent/last-modified-date
- agent/first-publish-date
- agent/event
- exploited/true
- collector/cisa-known-exploited
- source/CISA
- agent/software-canonical-lookup
- agent/references
- agent/tags
- collector/nvd-cve
- source/NVD
- vendor/zabbix
- canonical/zabbix zabbix
- version/zabbix zabbix/5.4.0
- version/zabbix zabbix/5.4.8
- version/zabbix zabbix/6.0.0-alpha1
- canonical/zabbix frontend
Contact
SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.coBy using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203