CVE-2022-23134

EUVD-2022-28225
After the initial setup process, some steps of setup.php file are reachable not only by super-administrators, but by unauthenticated users as well. Malicious actor can pass step checks and potentially change the configuration of Zabbix Frontend.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
3.7 LOW
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
ZabbixCNA
3.7 LOW
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 99%
Affected Products (NVD)
VendorProductVersion
zabbixzabbix
5.4.0 ≤
𝑥
≤ 5.4.8
zabbixzabbix
6.0.0:alpha1
zabbixzabbix
6.0.0:alpha2
zabbixzabbix
6.0.0:alpha3
zabbixzabbix
6.0.0:alpha4
zabbixzabbix
6.0.0:alpha5
zabbixzabbix
6.0.0:alpha6
zabbixzabbix
6.0.0:alpha7
zabbixzabbix
6.0.0:beta1
debiandebian_linux
9.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
zabbix
bookworm
1:6.0.14+dfsg-1
fixed
bullseye
1:5.0.8+dfsg-1
not-affected
bullseye (security)
1:5.0.44+dfsg-1+deb11u1
fixed
buster
not-affected
sid
1:7.0.5+dfsg-1
fixed
trixie
1:7.0.5+dfsg-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
zabbix
bionic
not-affected
focal
not-affected
hirsute
ignored
impish
ignored
jammy
not-affected
kinetic
ignored
lunar
ignored
mantic
not-affected
noble
dne
trusty
not-affected
xenial
not-affected