{
    "file_item": {
        "filepath": "security-advisories",
        "filename": "CERT-EU-SA2024-082.pdf"
    },
    "title": "Zabbix Server Critical Arbitrary Code Execution Vulnerability",
    "serial_number": "2024-082",
    "publish_date": "16-08-2024 08:46:49",
    "description": "On August 13, 2024, a critical vulnerability, CVE-2024-22116, was disclosed in Zabbix Server, allowing attackers with restricted administrative permissions to execute arbitrary code. The flaw, identified in the Ping script execution within the Monitoring Hosts section, can compromise the entire infrastructure. The vulnerability carries a CVSS score of 9.9.<br>\n",
    "url_title": "2024-082",
    "content_markdown": "---\ntitle: 'Zabbix Server Critical Arbitrary Code\u00a0Execution Vulnerability'\nnumber: '2024-082'\nversion: '1.0'\noriginal_date: 'August 13, 2024'\ndate: 'August 16, 2024'\n---\n\n_History:_\n\n* _16/08/2024 --- v1.0 -- Initial publication_\n\n# Summary\n\nOn August 13, 2024, a critical vulnerability, **CVE-2024-22116**, was disclosed in Zabbix Server, allowing attackers with restricted administrative permissions to execute arbitrary code. The flaw, identified in the Ping script execution within the Monitoring Hosts section, can compromise the entire infrastructure. The vulnerability carries a CVSS score of 9.9 [1].\n\n# Technical Details\n\nCVE-2024-22116 is a code injection vulnerability (CWE-94) where improper control over script parameters allows arbitrary code execution via the Ping script in the Monitoring Hosts section [1].\n\n# Affected Products\n\n- Zabbix Server versions 6.4.0 to 6.4.15\n- Zabbix Server versions 7.0.0alpha1 to 7.0.0rc2\n\n# Recommendations\n\nCERT-EU strongly recommends upgrading to Zabbix versions 6.4.16rc1 or 7.0.0rc3 immediately, as no workarounds are available.\n\n# References\n\n[1] <https://cybersecuritynews.com/zabbix-server-vulnerability/>\n",
    "content_html": "<p><em>History:</em></p><ul><li><em>16/08/2024 --- v1.0 -- Initial publication</em></li></ul><h2 id=\"summary\">Summary</h2><p>On August 13, 2024, a critical vulnerability, <strong>CVE-2024-22116</strong>, was disclosed in Zabbix Server, allowing attackers with restricted administrative permissions to execute arbitrary code. The flaw, identified in the Ping script execution within the Monitoring Hosts section, can compromise the entire infrastructure. The vulnerability carries a CVSS score of 9.9 [1].</p><h2 id=\"technical-details\">Technical Details</h2><p>CVE-2024-22116 is a code injection vulnerability (CWE-94) where improper control over script parameters allows arbitrary code execution via the Ping script in the Monitoring Hosts section [1].</p><h2 id=\"affected-products\">Affected Products</h2><ul><li>Zabbix Server versions 6.4.0 to 6.4.15</li><li>Zabbix Server versions 7.0.0alpha1 to 7.0.0rc2</li></ul><h2 id=\"recommendations\">Recommendations</h2><p>CERT-EU strongly recommends upgrading to Zabbix versions 6.4.16rc1 or 7.0.0rc3 immediately, as no workarounds are available.</p><h2 id=\"references\">References</h2><p>[1] <a rel=\"noopener\" target=\"_blank\" href=\"https://cybersecuritynews.com/zabbix-server-vulnerability/\">https://cybersecuritynews.com/zabbix-server-vulnerability/</a></p>",
    "licence": {
        "title": "Creative Commons Attribution 4.0 International (CC-BY 4.0)",
        "link": "https://creativecommons.org/licenses/by/4.0/",
        "restrictions": "https://cert.europa.eu/legal-notice",
        "author": "The Cybersecurity Service for the Union institutions, bodies, offices and agencies"
    }
}