First published: Fri Aug 09 2024(Updated: )
A non-admin user can change or remove important features within the Zabbix Agent application, thus impacting the integrity and availability of the application.
Credit: security@zabbix.com
Affected Software | Affected Version | How to fix |
---|---|---|
Zabbix Server | >=5.0.0<=5.0.42 | |
Zabbix Server | >=6.0.0<=6.0.30 | |
Zabbix Server | >=6.4.0<=6.4.15 | |
Zabbix Server | =7.0.0-alpha1 | |
Zabbix Server | =7.0.0-alpha2 | |
Zabbix Server | =7.0.0-alpha3 | |
Zabbix Server | =7.0.0-alpha4 | |
Zabbix Server | =7.0.0-alpha5 | |
Zabbix Server | =7.0.0-alpha6 | |
Zabbix Server | =7.0.0-alpha7 | |
Zabbix Server | =7.0.0-alpha8 | |
Zabbix Server | =7.0.0-alpha9 | |
Zabbix Server | =7.0.0-beta1 | |
Zabbix Server | =7.0.0-beta2 | |
Zabbix Server | =7.0.0-beta3 | |
Zabbix Server | =7.0.0-rc1 | |
Zabbix Server | =7.0.0-rc2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-22121 is classified as a high-severity vulnerability due to its potential impact on the integrity and availability of Zabbix Agent.
To fix CVE-2024-22121, upgrade to the latest patched version of the Zabbix Agent application as recommended in the security release notes.
CVE-2024-22121 affects Zabbix versions between 5.0.0 and 5.0.42, as well as 6.0.0 to 6.0.30 and 6.4.0 to 6.4.15, along with multiple alpha, beta, and release candidate versions of 7.0.
Yes, non-admin users can exploit CVE-2024-22121 to change or remove important features within the Zabbix Agent application.
If you are using an affected version of Zabbix, it is crucial to upgrade to a non-vulnerable version to ensure the security and functionality of your application.