-
Defect (Security)
-
Resolution: Fixed
-
Minor
-
None
-
None
-
None
CVE ID | CVE-2025-27233 |
CVSS score | 5.7 (Medium) |
CVSS vector | CVSS:4.0/AV:A/AC:H/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
Affected components | Agent2 plugin |
Summary | Zabbix Agent 2 smartctl plugin argument injection in Zabbix 6.0 and later. |
Description | Zabbix Agent 2 smartctl plugin does not properly sanitize smart.disk.get parameters, allowing an attacker to inject unexpected arguments into the smartctl command. This can be used to leak the NTLMv2 hash from a Windows system. |
Known attack vectors | An attacker could request Agent 2 to monitor a metric with malicious arguments in the smart.disk.get metric. |
Affected and fix version/s | Affected: 6.0.0 - 6.0.39 → Fixed: 6.0.40 Affected: 7.0.0 - 7.0.10 → Fixed: 7.0.11 Affected: 7.2.0 - 7.2.4 → Fixed: 7.2.5 |
Mitigation | Update the affected components to their respective fixed versions. |
Workarounds | Remove smartctl or use strict item key parameter validation with AllowKey/DenyKey. |
Acknowledgements | Zabbix wants to thank kelsier for submitting this report on the HackerOne bug bounty platform. |
- mentioned in
-
Page Loading...