CVE-2023-32727

EUVD-2023-36954
An attacker who has the privilege to configure Zabbix items can use function icmpping() with additional malicious command inside it to execute arbitrary code on the current Zabbix server.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
6.8 MEDIUM
NETWORK
LOW
HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
ZabbixCNA
6.8 MEDIUM
NETWORK
LOW
HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 63%
Affected Products (NVD)
VendorProductVersion
zabbixzabbix_server
4.0.0 ≤
𝑥
≤ 4.0.49
zabbixzabbix_server
5.0.0 ≤
𝑥
≤ 5.0.38
zabbixzabbix_server
6.0.0 ≤
𝑥
≤ 6.0.22
zabbixzabbix_server
6.4.0 ≤
𝑥
≤ 6.4.7
zabbixzabbix_server
7.0.0:alpha1
zabbixzabbix_server
7.0.0:alpha2
zabbixzabbix_server
7.0.0:alpha3
zabbixzabbix_server
7.0.0:alpha6
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
zabbix
bookworm
vulnerable
bullseye
vulnerable
bullseye (security)
1:5.0.45+dfsg-1+deb11u1
fixed
buster
not-affected
sid
1:7.0.6+dfsg-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
zabbix
bionic
not-affected
focal
needed
jammy
needed
lunar
ignored
mantic
ignored
noble
dne
oracular
not-affected
trusty
not-affected
xenial
not-affected