fkie_cve-2022-43515
Vulnerability from fkie_nvd
Published
2022-12-05 19:15
Modified
2024-11-21 07:26
Severity ?
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
Zabbix Frontend provides a feature that allows admins to maintain the installation and ensure that only certain IP addresses can access it. In this way, any user will not be able to access the Zabbix Frontend while it is being maintained and possible sensitive data will be prevented from being disclosed. An attacker can bypass this protection and access the instance using IP address not listed in the defined range.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zabbix:frontend:*:*:*:*:*:*:*:*", "matchCriteriaId": "A5E0557F-21A9-4487-B219-AB7903F2CBBA", "versionEndIncluding": "4.0.44", "versionStartIncluding": "4.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zabbix:frontend:*:*:*:*:*:*:*:*", "matchCriteriaId": "9E9D01B5-00EC-4F61-9A84-46D6D1CD501D", "versionEndIncluding": "5.0.29", "versionStartIncluding": "5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zabbix:frontend:*:*:*:*:*:*:*:*", "matchCriteriaId": "B049CCE9-8A54-4898-A580-4405FF33CA26", "versionEndIncluding": "6.0.9", "versionStartIncluding": "6.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zabbix:frontend:*:*:*:*:*:*:*:*", "matchCriteriaId": "E3862952-9438-46A7-944A-2B167FDE296E", "versionEndIncluding": "6.2.4", "versionStartIncluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zabbix:frontend:5.0.30:rc1:*:*:*:*:*:*", "matchCriteriaId": "B9FE15CC-A84E-4582-9EE5-5F7D1CABA380", "vulnerable": true }, { "criteria": "cpe:2.3:a:zabbix:frontend:6.0.11:rc1:*:*:*:*:*:*", "matchCriteriaId": "E8DF83D6-3E42-4172-89DA-665F432CCD60", "vulnerable": true }, { "criteria": "cpe:2.3:a:zabbix:frontend:6.2.5:rc1:*:*:*:*:*:*", "matchCriteriaId": "0FD05466-9BB2-4404-B21D-51F4B2E30BB4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Zabbix Frontend provides a feature that allows admins to maintain the installation and ensure that only certain IP addresses can access it. In this way, any user will not be able to access the Zabbix Frontend while it is being maintained and possible sensitive data will be prevented from being disclosed. An attacker can bypass this protection and access the instance using IP address not listed in the defined range." }, { "lang": "es", "value": "Zabbix Frontend proporciona una funci\u00f3n que permite a los administradores mantener la instalaci\u00f3n y garantizar que solo ciertas direcciones IP puedan acceder a ella. De esta forma, ning\u00fan usuario podr\u00e1 acceder al Frontend de Zabbix mientras est\u00e9 en mantenimiento y se evitar\u00e1 que se divulguen posibles datos sensibles. Un atacante puede eludir esta protecci\u00f3n y acceder a la instancia utilizando una direcci\u00f3n IP que no figura en el rango definido." } ], "id": "CVE-2022-43515", "lastModified": "2024-11-21T07:26:40.877", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "security@zabbix.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-12-05T19:15:10.363", "references": [ { "source": "security@zabbix.com", "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00027.html" }, { "source": "security@zabbix.com", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://support.zabbix.com/browse/ZBX-22050" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00027.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://support.zabbix.com/browse/ZBX-22050" } ], "sourceIdentifier": "security@zabbix.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "security@zabbix.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-863" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…