CVE-2022-43515
05.12.2022, 19:15
Zabbix Frontend provides a feature that allows admins to maintain the installation and ensure that only certain IP addresses can access it. In this way, any user will not be able to access the Zabbix Frontend while it is being maintained and possible sensitive data will be prevented from being disclosed. An attacker can bypass this protection and access the instance using IP address not listed in the defined range.Enginsight
Vendor | Product | Version |
---|---|---|
zabbix | frontend | 4.0.0 ≤ 𝑥 ≤ 4.0.44 |
zabbix | frontend | 5.0.0 ≤ 𝑥 ≤ 5.0.29 |
zabbix | frontend | 6.0.0 ≤ 𝑥 ≤ 6.0.9 |
zabbix | frontend | 6.2.0 ≤ 𝑥 ≤ 6.2.4 |
zabbix | frontend | 5.0.30:rc1 |
zabbix | frontend | 6.0.11:rc1 |
zabbix | frontend | 6.2.5:rc1 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
- CWE-20 - Improper Input ValidationThe product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
- CWE-863 - Incorrect AuthorizationThe software performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions.