CVE-2022-23134

LOW KEV NUCLEI

Zabbix < 5.4.8 - Improper Access Control

Title source: rule

Description

After the initial setup process, some steps of setup.php file are reachable not only by super-administrators, but by unauthenticated users as well. Malicious actor can pass step checks and potentially change the configuration of Zabbix Frontend.

Exploits (1)

nomisec WORKING POC 1 stars
by TheN00bBuilder · remote
https://github.com/TheN00bBuilder/cve-2022-23134-poc-and-writeup

Nuclei Templates (1)

Zabbix Setup Configuration Authentication Bypass
MEDIUMby bananabr
Shodan: http.favicon.hash:892542951 || http.title:"zabbix-server" || cpe:"cpe:2.3:a:zabbix:zabbix"
FOFA: icon_hash=892542951 || app="zabbix-监控系统" && body="saml" || title="zabbix-server"

Scores

CVSS v3 3.7
EPSS 0.9310
EPSS Percentile 99.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

Details

CISA KEV 2022-02-22
VulnCheck KEV 2022-02-22
InTheWild.io 2022-02-22
ENISA EUVD EUVD-2022-28225
CWE
CWE-284 CWE-287
Status published
Products (5)
debian/debian_linux 9.0
fedoraproject/fedora 34
fedoraproject/fedora 35
zabbix/zabbix 6.0.0 alpha1 (8 CPE variants)
zabbix/zabbix 5.4.0 - 5.4.8
Published Jan 13, 2022
KEV Added Feb 22, 2022
Tracked Since Feb 18, 2026