First published: Wed Nov 30 2022(Updated: )
A Firewall Rule which allows all incoming TCP connections to all programs from any source and to all ports is created in Windows Firewall after Zabbix agent installation (MSI)
Credit: security@zabbix.com security@zabbix.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows Firewall | ||
Zabbix Server | >=6.0.10<6.0.12 | |
Zabbix Server | >=6.2.0<6.2.6 | |
Zabbix Server | =6.0.12-rc1 | |
Zabbix Server | =6.2.6-rc1 |
To remediate this vulnerability, apply the updates listed in the 'Unaffected' section to appropriate products or use the workaround
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-43516 is a vulnerability that allows all incoming TCP connections to all programs from any source and to all ports in Windows Firewall after Zabbix agent installation.
CVE-2022-43516 affects Microsoft Windows Firewall by creating a Firewall Rule that allows all incoming TCP connections to all programs from any source and to all ports after Zabbix agent installation.
The severity of CVE-2022-43516 is critical, with a severity value of 9.8.
CVE-2022-43516 affects Zabbix Zabbix versions 6.0.10 to 6.0.12 by creating a Firewall Rule that allows all incoming TCP connections to all programs from any source and to all ports in Windows Firewall after Zabbix agent installation.
CVE-2022-43516 affects Zabbix Zabbix versions 6.2.0 to 6.2.6 by creating a Firewall Rule that allows all incoming TCP connections to all programs from any source and to all ports in Windows Firewall after Zabbix agent installation.
To fix CVE-2022-43516, you should update Zabbix to a version that is not affected by the vulnerability and remove the Firewall Rule manually.