CVE-2022-23134
Summary
| CVE | CVE-2022-23134 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2022-01-13 16:15:00 UTC |
| Updated | 2023-11-07 03:44:00 UTC |
| Description | After the initial setup process, some steps of setup.php file are reachable not only by super-administrators, but by unauthenticated users as well. Malicious actor can pass step checks and potentially change the configuration of Zabbix Frontend. |
Risk And Classification
EPSS: 0.930960000 probability, percentile 0.997900000 (date 2026-04-01)
CISA KEV: Listed on 2022-02-22; due 2022-03-08; ransomware use Unknown
Problem Types: CWE-287
CISA Known Exploited Vulnerability
| Vendor | Zabbix |
|---|---|
| Product | Frontend |
| Name | Zabbix Frontend Improper Access Control Vulnerability |
| Required Action | Apply updates per vendor instructions. |
| Notes | https://nvd.nist.gov/vuln/detail/CVE-2022-23134 |
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Debian | Debian Linux | 9.0 | All | All | All |
| Operating System | Fedoraproject | Fedora | 34 | All | All | All |
| Operating System | Fedoraproject | Fedora | 35 | All | All | All |
| Application | Zabbix | Zabbix | 6.0.0 | alpha1 | All | All |
| Application | Zabbix | Zabbix | 6.0.0 | alpha2 | All | All |
| Application | Zabbix | Zabbix | 6.0.0 | alpha3 | All | All |
| Application | Zabbix | Zabbix | 6.0.0 | alpha4 | All | All |
| Application | Zabbix | Zabbix | 6.0.0 | alpha5 | All | All |
| Application | Zabbix | Zabbix | 6.0.0 | alpha6 | All | All |
| Application | Zabbix | Zabbix | 6.0.0 | alpha7 | All | All |
| Application | Zabbix | Zabbix | 6.0.0 | beta1 | All | All |
| Application | Zabbix | Zabbix | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| [SECURITY] Fedora 34 Update: zabbix-5.0.19-1.fc34 - package-announce - Fedora Mailing-Lists | lists.fedoraproject.org | ||
| [SECURITY] Fedora 34 Update: zabbix-5.0.19-1.fc34 - package-announce - Fedora Mailing-Lists | FEDORA | lists.fedoraproject.org | |
| [ZBX-20384] Possible view of the setup pages by unauthenticated users if config file already exists (CVE-2022-23134) - ZABBIX SUPPORT | MISC | support.zabbix.com | |
| [SECURITY] Fedora 35 Update: zabbix-5.0.19-1.fc35 - package-announce - Fedora Mailing-Lists | lists.fedoraproject.org | ||
| [SECURITY] [DLA 2914-1] zabbix security update | MLIST | lists.debian.org | |
| [SECURITY] Fedora 35 Update: zabbix-5.0.19-1.fc35 - package-announce - Fedora Mailing-Lists | FEDORA | lists.fedoraproject.org | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
| CISA Known Exploited Vulnerabilities catalog | CISA | www.cisa.gov | kev |
Vendor Comments And Credit
Discovery Credit
LEGACY: Zabbix wants to thank Thomas Chauchefoin from SonarSource for reporting this issue to us
Legacy QID Mappings
- 179059 Debian Security Update for zabbix (DLA 2914-1)
- 182168 Debian Security Update for zabbix (CVE-2022-23134)
- 282270 Fedora Security Update for zabbix (FEDORA-2022-dfe346f53f)
- 282277 Fedora Security Update for zabbix (FEDORA-2022-1a667b0f90)
- 376061 Zabbix Authentication Bypass Vulnerability (ZBX-20350)
- 751719 OpenSUSE Security Update for zabbix (openSUSE-SU-2022:0036-1)