First published: Mon Dec 18 2023(Updated: )
The Zabbix Agent 2 item key smart.disk.get does not sanitize its parameters before passing them to a shell command resulting possible vulnerability for remote code execution.
Credit: security@zabbix.com
Affected Software | Affected Version | How to fix |
---|---|---|
Zabbix Zabbix-agent2 | >=5.0.0<=5.0.38 | |
Zabbix Zabbix-agent2 | >=6.0.0<=6.0.23 | |
Zabbix Zabbix-agent2 | >=6.4.0<=6.4.8 | |
Zabbix Zabbix-agent2 | =7.0.0-alpha1 | |
Zabbix Zabbix-agent2 | =7.0.0-alpha2 | |
Zabbix Zabbix-agent2 | =7.0.0-alpha3 | |
Zabbix Zabbix-agent2 | =7.0.0-alpha6 | |
Zabbix Zabbix-agent2 | =7.0.0-alpha7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-32728 is considered a critical vulnerability due to its potential for remote code execution.
To fix CVE-2023-32728, update your Zabbix Agent 2 to a version that addresses this issue.
CVE-2023-32728 affects Zabbix Agent 2 versions from 5.0.0 to 5.0.38, 6.0.0 to 6.0.23, 6.4.0 to 6.4.8, and several alpha versions of 7.0.0.
CVE-2023-32728 can potentially be exploited by an attacker to execute arbitrary commands on a vulnerable system.
Systems running affected versions of Zabbix Agent 2 without necessary mitigations are vulnerable to CVE-2023-32728.