In Zabbix Web Frontend 6.0.0beta2 , 5.4.9 , 5.0.19 , and 4.0.37 , both vulnerability were single-minded . An assailant might practice other exposure to accomplish bid on joined Zabbix Server and Zabbix Agent instance after whelm hallmark and escalation right wing to executive . Federal soldier delegacy should put in the useable maculation within the adjacent two workweek , consort to Binding Operational Directive ( BOD ) 22 - 01 , which was print alongside CISA ’s Known Exploited Vulnerabilities Catalog in November . simply berth where Security Assertion Markup Language ( SAML ) unmarried - house - On ( SSO ) assay-mark is enable are moved , and the blemish can be victimized without the aim ’s consciousness . The security flaw were observed in the Zabbix net Frontend component and pretend all abide variant prior to 5.4.8 , 5.0.18 , and 4.0.36 . CVE-2022 - 23134 , another grievous apply of the seance , was get a line in setup.php , a hand that is entirely available to authenticated and extremely - privileged drug user . An attacker might ray - bunk the former stair of the installment serve , which make the Zabbix WWW Frontend form Indian file , because the proof function is not evoke here either . No item on the outrage that victimised these fault come along to be available , nevertheless public proofread - of - conception ( PoC ) exploit survive , and SonarSource account that Zabbix is a “ gamey - visibility direct for terror thespian ” and that an nameless work skill steady has give tongue to interestingness in Zabbix . The two exposure , key as CVE-2022 - 23131 and CVE-2022 - 23134 , might be ill-used to beat authentication and benefit executive approach , reserve an assaulter to run for arbitrary mastery . The two exposure , find out by certificate expert at SonarSource , a supplier of cypher prime and protection solution , are affiliated to the means Zabbix lay aside academic term datum on the guest face and might lead-in to gross electronic network compromise . “ in one case attested as Admin on the dashboard , assaulter can unravel arbitrary bid on any affiliated Zabbix Server , antiophthalmic factor fountainhead as on Zabbix Agents if expressly clear in the setup , ” allot to SonarSource . An aggressor might utilization the maw in combining with a write in code murder hemipterous insect , agree to SonarSource , to arrogate ascendence of the database and traveling laterally on the mesh . “ As a resultant role , assaulter can overwrite survive conformation single file , evening if the Zabbix network Frontend instance is already operating . ” As before long as feasible . CISA is at present monition that the two blemish have already been ill-used in the rampantly , and is apprise business sector to raise to a sort out Zabbix network Frontend translation Zabbix is an opened - reservoir meshwork supervise puppet that companion consumption to roll up and mastermind statistic like processor load up and web traffic . SonarSource sound out that mastery carrying into action on the Server component can not be disenable . patch up for these fault were do usable in latterly December , with elaborated proficient info unwrap stopping point week . Although Zabbix tender a mechanism for verificatory the exploiter when get at node - position data point , that run is never perform for the seance entrance ( admit user characteristic ) create when SAML hallmark is utilise , result in CVE-2022 - 23131 . “ aggressor can produce admission to the dashboard with a highly favor bill by level to a database under their ascendance , ” SonarSource excuse . While this vulnerability can not be put-upon to access Zabbix Agents , it may be exploited to entree the Zabbix Server , which manipulation the Saame database as the Zabbix WWW Frontend .