Zabbix Frontend provides a feature that allows admins to maintain the installation and ensure that only certain IP addresses can access it. In this way, any user will not be able to access the Zabbix Frontend while it is being maintained and possible sensitive data will be prevented from being disclosed. An attacker can bypass this protection and access the instance using IP address not listed in the defined range.
References
Link | Resource |
---|---|
https://lists.debian.org/debian-lts-announce/2023/08/msg00027.html | |
https://support.zabbix.com/browse/ZBX-22050 | Exploit Vendor Advisory |
https://lists.debian.org/debian-lts-announce/2023/08/msg00027.html | |
https://support.zabbix.com/browse/ZBX-22050 | Exploit Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:26
Type | Values Removed | Values Added |
---|---|---|
References | () https://lists.debian.org/debian-lts-announce/2023/08/msg00027.html - | |
References | () https://support.zabbix.com/browse/ZBX-22050 - Exploit, Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
22 Aug 2023, 19:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2022-12-05 19:15
Updated : 2024-11-21 07:26
NVD link : CVE-2022-43515
Mitre link : CVE-2022-43515
CVE.ORG link : CVE-2022-43515
JSON object : View
Products Affected
zabbix
- frontend