Uploaded image for project: 'ZABBIX BUGS AND ISSUES'
  1. ZABBIX BUGS AND ISSUES
  2. ZBX-26987

Zabbix Agent 2 smartctl plugin argument injection in Zabbix 6.0 and later (CVE-2025-27233)

XMLWordPrintable

    • Icon: Defect (Security) Defect (Security)
    • Resolution: Fixed
    • Icon: Minor Minor
    • None
    • None
    • Agent2 plugin (G)
    • None

      CVE ID CVE-2025-27233
      CVSS score 5.7 (Medium)
      CVSS vector CVSS:4.0/AV:A/AC:H/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
      Affected components Agent2 plugin
      Summary Zabbix Agent 2 smartctl plugin argument injection in Zabbix 6.0 and later.
      Description Zabbix Agent 2 smartctl plugin does not properly sanitize smart.disk.get parameters, allowing an attacker to inject unexpected arguments into the smartctl command. This can be used to leak the NTLMv2 hash from a Windows system.
      Known attack vectors An attacker could request Agent 2 to monitor a metric with malicious arguments in the smart.disk.get metric.
      Affected and fix version/s Affected: 6.0.0 - 6.0.39 → Fixed: 6.0.40
      Affected: 7.0.0 - 7.0.10 → Fixed: 7.0.11
      Affected: 7.2.0 - 7.2.4 → Fixed: 7.2.5
      Mitigation Update the affected components to their respective fixed versions.
      Workarounds Remove smartctl or use strict item key parameter validation with AllowKey/DenyKey.
      Acknowledgements Zabbix wants to thank kelsier for submitting this report on the HackerOne bug bounty platform.

            zabbix.support Zabbix Support Team
            jnulle Janis Nulle
            Votes:
            0 Vote for this issue
            Watchers:
            1 Start watching this issue

              Created:
              Updated:
              Resolved: