CVE-2020-11800

Zabbix Server 2.2.x and 3.0.x before 3.0.31, and 3.2 allows remote attackers to execute arbitrary code.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
9.8 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
mitreCNA
9 CRITICAL
NETWORK
HIGH
NONE
CVSS:3.0/AC:H/AV:N/A:H/C:H/I:H/PR:N/S:C/UI:N
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 97%
VendorProductVersion
zabbixzabbix
2.2.0 ≤
𝑥
< 3.0.31
zabbixzabbix
3.2.0
opensusebackports_sle
15.0:sp1
opensusebackports_sle
15.0:sp2
opensuseleap
15.1
opensuseleap
15.2
debiandebian_linux
9.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
zabbix
bullseye
1:5.0.8+dfsg-1
fixed
bullseye (security)
1:5.0.44+dfsg-1+deb11u1
fixed
bookworm
1:6.0.14+dfsg-1
fixed
sid
1:7.0.5+dfsg-1
fixed
trixie
1:7.0.5+dfsg-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
zabbix
lunar
not-affected
kinetic
not-affected
jammy
not-affected
impish
not-affected
hirsute
not-affected
groovy
not-affected
focal
not-affected
bionic
Fixed 1:3.0.12+dfsg-1ubuntu0.1~esm2
released
xenial
Fixed 1:2.4.7+dfsg-2ubuntu2.1+esm2
released
trusty
Fixed 1:2.2.2+dfsg-1ubuntu1+esm3
released