zabbix zabbix CVE-2022-23131 vulnerability in Zabbix Products
Published on January 13, 2022

In the case of instances where the SAML SSO authentication is enabled (non-default), session data can be modified by a malicious actor, because a user login stored in the session was not verified. Malicious unauthenticated actor may exploit this issue to escalate privileges and gain admin access to Zabbix Frontend. To perform the attack, SAML authentication is required to be enabled and the actor has to know the username of Zabbix user (or use the guest account, which is disabled by default).

NVD

Known Exploited Vulnerability

This Zabbix Frontend Authentication Bypass Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. Unsafe client-side session storage leading to authentication bypass/instance takeover via Zabbix Frontend with configured SAML.

The following remediation steps are recommended / required by March 8, 2022: Apply updates per vendor instructions.

Vulnerability Analysis

CVE-2022-23131 can be exploited with network access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. This vulnerability is known to be actively exploited by threat actors in an automatable fashion. The potential impact of an exploit of this vulnerability is considered to have a high impact on confidentiality and integrity, and no impact on availability.

Attack Vector:
NETWORK
Attack Complexity:
LOW
Privileges Required:
NONE
User Interaction:
NONE
Scope:
UNCHANGED
Confidentiality Impact:
HIGH
Integrity Impact:
HIGH
Availability Impact:
NONE

Weakness Type

Authentication Bypass by Spoofing

This attack-focused weakness is caused by improperly implemented authentication schemes that are subject to spoofing attacks.


Products Associated with CVE-2022-23131

You can be notified by email with stack.watch whenever vulnerabilities like CVE-2022-23131 are published in these products:

 
 

Affected Versions

Zabbix Frontend:

Exploit Probability

EPSS
94.30%
Percentile
99.94%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.