{"api_version":"1","generated_at":"2026-04-23T02:37:05+00:00","cve":"CVE-2022-43515","urls":{"html":"https://cve.report/CVE-2022-43515","api":"https://cve.report/api/cve/CVE-2022-43515.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-43515","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-43515"},"summary":{"title":"CVE-2022-43515","description":"Zabbix Frontend provides a feature that allows admins to maintain the installation and ensure that only certain IP addresses can access it. In this way, any user will not be able to access the Zabbix Frontend while it is being maintained and possible sensitive data will be prevented from being disclosed. An attacker can bypass this protection and access the instance using IP address not listed in the defined range.","state":"PUBLIC","assigner":"security@zabbix.com","published_at":"2022-12-05 19:15:00","updated_at":"2023-08-22 19:16:00"},"problem_types":["CWE-863"],"metrics":[],"references":[{"url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00027.html","name":"[debian-lts-announce] 20230822 [SECURITY] [DLA 3538-1] zabbix security update","refsource":"MLIST","tags":[],"title":"[SECURITY] [DLA 3538-1] zabbix security update","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://support.zabbix.com/browse/ZBX-22050","name":"https://support.zabbix.com/browse/ZBX-22050","refsource":"MISC","tags":[],"title":"[ZBX-22050] X-Forwarded-For header is active by default causes access to zabbix sites in maintenance mode (CVE-2022-43515) - ZABBIX SUPPORT","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://support.zabbix.com/browse/ZBXSEC-125","name":"https://support.zabbix.com/browse/ZBXSEC-125","refsource":"MISC","tags":[],"title":"Log in - ZABBIX SUPPORT","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-43515","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-43515","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"LEGACY","value":"osman1337","lang":""}],"nvd_cpes":[{"cve_year":"2022","cve_id":"43515","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"zabbix","cpe5":"frontend","cpe6":"5.0.30","cpe7":"rc1","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"43515","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"zabbix","cpe5":"frontend","cpe6":"6.0.11","cpe7":"rc1","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"43515","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"zabbix","cpe5":"frontend","cpe6":"6.2.5","cpe7":"rc1","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"43515","vulnerable":"1","versionEndIncluding":"4.0.44","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"zabbix","cpe5":"frontend","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"43515","vulnerable":"1","versionEndIncluding":"5.0.29","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"zabbix","cpe5":"frontend","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"43515","vulnerable":"1","versionEndIncluding":"6.0.9","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"zabbix","cpe5":"frontend","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"43515","vulnerable":"1","versionEndIncluding":"6.2.4","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"zabbix","cpe5":"frontend","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2022-43515","qid":"6000015","title":"Debian Security Update for zabbix (DLA 3538-1)"},{"cve":"CVE-2022-43515","qid":"753005","title":"SUSE Enterprise Linux Security Update for zabbix (SUSE-SU-2022:4477-1)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"AKA":"ZBV-2022-10-1","ASSIGNER":"security@zabbix.com","DATE_PUBLIC":"2022-10-18T06:21:00.000Z","ID":"CVE-2022-43515","STATE":"PUBLIC","TITLE":"X-Forwarded-For header is active by default causes access to Zabbix sites in maintenance mode"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Frontend","version":{"version_data":[{"version_affected":"=","version_value":"4.0.0-4.0.44"},{"version_affected":"=","version_value":"5.0.0-5.0.29"},{"version_affected":"=","version_value":"6.0.0-6.0.9"},{"version_affected":"=","version_value":"6.2.0-6.2.4"},{"version_affected":"!>=","version_value":"5.0.30rc1"},{"version_affected":"!>=","version_value":"6.0.11rc1"},{"version_affected":"!>=","version_value":"6.2.5rc1"}]}}]},"vendor_name":"Zabbix"}]}},"credit":[{"lang":"eng","value":"osman1337"}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Zabbix Frontend provides a feature that allows admins to maintain the installation and ensure that only certain IP addresses can access it. In this way, any user will not be able to access the Zabbix Frontend while it is being maintained and possible sensitive data will be prevented from being disclosed. An attacker can bypass this protection and access the instance using IP address not listed in the defined range."}]},"generator":{"engine":"Vulnogram 0.0.9"},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":5.3,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-20 Improper Input Validation"}]}]},"references":{"reference_data":[{"refsource":"MISC","url":"https://support.zabbix.com/browse/ZBX-22050","name":"https://support.zabbix.com/browse/ZBX-22050"},{"refsource":"MLIST","name":"[debian-lts-announce] 20230822 [SECURITY] [DLA 3538-1] zabbix security update","url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00027.html"}]},"solution":[{"lang":"eng","value":"To remediate this vulnerability, apply the updates listed in the 'Unaffected' section to appropriate products or use the workaround"}],"source":{"discovery":"EXTERNAL"},"work_around":[{"lang":"eng","value":"If an immediate update is not possible, limit network access to Zabbix Frontend during the maintenance window."}]},"nvd":{"publishedDate":"2022-12-05 19:15:00","lastModifiedDate":"2023-08-22 19:16:00","problem_types":["CWE-863"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"},"exploitabilityScore":3.9,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:zabbix:frontend:6.2.5:rc1:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:zabbix:frontend:6.0.11:rc1:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:zabbix:frontend:5.0.30:rc1:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:zabbix:frontend:*:*:*:*:*:*:*:*","versionStartIncluding":"6.2.0","versionEndIncluding":"6.2.4","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:zabbix:frontend:*:*:*:*:*:*:*:*","versionStartIncluding":"6.0.0","versionEndIncluding":"6.0.9","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:zabbix:frontend:*:*:*:*:*:*:*:*","versionStartIncluding":"5.0.0","versionEndIncluding":"5.0.29","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:zabbix:frontend:*:*:*:*:*:*:*:*","versionStartIncluding":"4.0.0","versionEndIncluding":"4.0.44","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}