CVE-2022-43515

Zabbix Frontend provides a feature that allows admins to maintain the installation and ensure that only certain IP addresses can access it. In this way, any user will not be able to access the Zabbix Frontend while it is being maintained and possible sensitive data will be prevented from being disclosed. An attacker can bypass this protection and access the instance using IP address not listed in the defined range.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.3 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
ZabbixCNA
5.3 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
CVEADP
---
---
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 32%
VendorProductVersion
zabbixfrontend
4.0.0 ≤
𝑥
≤ 4.0.44
zabbixfrontend
5.0.0 ≤
𝑥
≤ 5.0.29
zabbixfrontend
6.0.0 ≤
𝑥
≤ 6.0.9
zabbixfrontend
6.2.0 ≤
𝑥
≤ 6.2.4
zabbixfrontend
5.0.30:rc1
zabbixfrontend
6.0.11:rc1
zabbixfrontend
6.2.5:rc1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
zabbix
bullseye
vulnerable
bullseye (security)
1:5.0.44+dfsg-1+deb11u1
fixed
bookworm
1:6.0.14+dfsg-1
fixed
sid
1:7.0.5+dfsg-1
fixed
trixie
1:7.0.5+dfsg-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
zabbix
noble
dne
mantic
not-affected
lunar
ignored
kinetic
ignored
jammy
needed
focal
needed
bionic
not-affected
xenial
not-affected
trusty
not-affected