CVE ID | CVE-2025-27237 |
CVSS score | 7.3 (High) |
CVSS vector | CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
Affected components | Agent, Agent2 |
Summary | DLL injection in Zabbix Agent and Agent 2 via OpenSSL configuration |
Description | In Zabbix Agent and Agent 2 on Windows, the OpenSSL configuration file is loaded from a path writable by low-privileged users, allowing malicious modification and potential local privilege escalation by injecting a DLL. |
Known attack vectors | A local Windows user with Zabbix Agent installed could modify the OpenSSL configuration file, but this file is only loaded after Zabbix Agent or the system restarts. |
Affected and fix version/s | Affected: 6.0.0 - 6.0.40 → Fixed: 6.0.41 Affected: 7.0.0 - 7.0.17 → Fixed: 7.0.18 Affected: 7.2.0 - 7.2.11 → Fixed: 7.2.12 Affected: 7.4.0 - 7.4.1 → Fixed: 7.4.2 |
Mitigation | Update the affected components to their respective fixed versions. |
Workarounds | - |
Acknowledgements | Zabbix wants to thank himbeer for submitting this report on the HackerOne bug bounty platform. |
- mentioned in
-
Page Loading...