CVE-2022-23132

EUVD-2022-28223
During Zabbix installation from RPM, DAC_OVERRIDE SELinux capability is in use to access PID files in [/var/run/zabbix] folder. In this case, Zabbix Proxy or Server processes can bypass file read, write and execute permissions check on the file system level
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
3.3 LOW
LOCAL
HIGH
LOW
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N
ZabbixCNA
3.3 LOW
LOCAL
HIGH
LOW
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 34%
Affected Products (NVD)
VendorProductVersion
zabbixzabbix
4.0.0 ≤
𝑥
≤ 4.0.36
zabbixzabbix
5.0.0 ≤
𝑥
≤ 5.0.18
zabbixzabbix
5.4.0 ≤
𝑥
≤ 5.4.8
zabbixzabbix
6.0.0:alpha1
zabbixzabbix
6.0.0:alpha2
zabbixzabbix
6.0.0:alpha3
zabbixzabbix
6.0.0:alpha4
zabbixzabbix
6.0.0:alpha5
zabbixzabbix
6.0.0:alpha6
zabbixzabbix
6.0.0:alpha7
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
zabbix
bookworm
1:6.0.14+dfsg-1
fixed
bullseye
vulnerable
bullseye (security)
1:5.0.44+dfsg-1+deb11u1
fixed
buster
not-affected
sid
1:7.0.5+dfsg-1
fixed
stretch
not-affected
trixie
1:7.0.5+dfsg-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
zabbix
bionic
not-affected
focal
needed
hirsute
ignored
impish
ignored
jammy
needed
kinetic
ignored
lunar
ignored
mantic
not-affected
noble
dne
trusty
not-affected
xenial
not-affected