First published: Mon Dec 18 2023(Updated: )
An attacker who has the privilege to configure Zabbix items can use function icmpping() with additional malicious command inside it to execute arbitrary code on the current Zabbix server.
Credit: security@zabbix.com
Affected Software | Affected Version | How to fix |
---|---|---|
Zabbix | >=4.0.0<=4.0.49 | |
Zabbix | >=5.0.0<=5.0.38 | |
Zabbix | >=6.0.0<=6.0.22 | |
Zabbix | >=6.4.0<=6.4.7 | |
Zabbix | =7.0.0-alpha1 | |
Zabbix | =7.0.0-alpha2 | |
Zabbix | =7.0.0-alpha3 | |
Zabbix | =7.0.0-alpha6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-32727 has been classified as a high severity vulnerability due to the potential for arbitrary code execution on the Zabbix server.
To fix CVE-2023-32727, upgrade Zabbix server to a version that is not affected, specifically version 4.0.50, 5.0.39, 6.0.23, 6.4.8 or later.
CVE-2023-32727 affects Zabbix server versions from 4.0.0 to 4.0.49, 5.0.0 to 5.0.38, 6.0.0 to 6.0.22, and 6.4.0 to 6.4.7, as well as specific alpha versions of 7.0.0.
Yes, CVE-2023-32727 can be exploited by attackers with the privilege to configure Zabbix items, allowing potential remote code execution.
The impact of CVE-2023-32727 is significant, as it allows privileged users to execute arbitrary code on the Zabbix server, potentially compromising the entire system.