CVE-2022-23134
LOW KEV NUCLEIZabbix < 5.4.8 - Improper Access Control
Title source: ruleDescription
After the initial setup process, some steps of setup.php file are reachable not only by super-administrators, but by unauthenticated users as well. Malicious actor can pass step checks and potentially change the configuration of Zabbix Frontend.
Exploits (1)
nomisec
WORKING POC
1 stars
by TheN00bBuilder · remote
https://github.com/TheN00bBuilder/cve-2022-23134-poc-and-writeup
Nuclei Templates (1)
Zabbix Setup Configuration Authentication Bypass
MEDIUMby bananabr
Shodan:
http.favicon.hash:892542951 || http.title:"zabbix-server" || cpe:"cpe:2.3:a:zabbix:zabbix"
FOFA:
icon_hash=892542951 || app="zabbix-监控系统" && body="saml" || title="zabbix-server"
References (5)
Scores
CVSS v3
3.7
EPSS
0.9310
EPSS Percentile
99.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
Details
CISA KEV
2022-02-22
VulnCheck KEV
2022-02-22
InTheWild.io
2022-02-22
ENISA EUVD
EUVD-2022-28225
CWE
CWE-284
CWE-287
Status
published
Products (5)
debian/debian_linux
9.0
fedoraproject/fedora
34
fedoraproject/fedora
35
zabbix/zabbix
6.0.0 alpha1 (8 CPE variants)
zabbix/zabbix
5.4.0 - 5.4.8
Published
Jan 13, 2022
KEV Added
Feb 22, 2022
Tracked Since
Feb 18, 2026