CVE-2022-43516 (GCVE-0-2022-43516)

Vulnerability from cvelistv5 – Published: 2022-12-12 01:49 – Updated: 2025-04-18 18:09
VLAI?
Summary
A Firewall Rule which allows all incoming TCP connections to all programs from any source and to all ports is created in Windows Firewall after Zabbix agent installation (MSI)
CWE
Assigner
Impacted products
Vendor Product Version
Zabbix Zabbix agent (MSI packages) Affected: Oct. 29, 2022 - Dec 2, 2022
Unaffected: Dec 3, 2022 , < unspecified (custom)
Create a notification for this product.
    Zabbix Zabbix agent 2 (MSI packages) Affected: Oct. 29, 2022 - Dec 2, 2022
Unaffected: Dec 3, 2022 , < unspecified (custom)
Create a notification for this product.
Credits
Joshua PowellNishiyama
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T13:32:59.496Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://support.zabbix.com/browse/ZBX-22002"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-43516",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-18T18:08:51.614314Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-18T18:09:22.186Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Zabbix agent (MSI packages)",
          "vendor": "Zabbix",
          "versions": [
            {
              "status": "affected",
              "version": "Oct. 29, 2022 - Dec 2, 2022"
            },
            {
              "lessThan": "unspecified",
              "status": "unaffected",
              "version": "Dec 3, 2022",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "Zabbix agent 2 (MSI packages)",
          "vendor": "Zabbix",
          "versions": [
            {
              "status": "affected",
              "version": "Oct. 29, 2022 - Dec 2, 2022"
            },
            {
              "lessThan": "unspecified",
              "status": "unaffected",
              "version": "Dec 3, 2022",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Joshua PowellNishiyama"
        }
      ],
      "datePublic": "2022-11-30T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "A Firewall Rule which allows all incoming TCP connections to all programs from any source and to all ports is created in Windows Firewall after Zabbix agent installation (MSI)"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-16",
              "description": "CWE-16 Configuration",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-12-05T00:00:00.000Z",
        "orgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
        "shortName": "Zabbix"
      },
      "references": [
        {
          "url": "https://support.zabbix.com/browse/ZBX-22002"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "To remediate this vulnerability, apply the updates listed in the \u0027Unaffected\u0027 section to appropriate products or use the workaround"
        }
      ],
      "source": {
        "discovery": "INTERNAL"
      },
      "title": "Zabbix Agent installer adds \u201callow all TCP any any\u201d firewall rule",
      "workarounds": [
        {
          "lang": "en",
          "value": "If an immediate update is not possible, change the applied local firewall rule to allow the agent port only."
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
    "assignerShortName": "Zabbix",
    "cveId": "CVE-2022-43516",
    "datePublished": "2022-12-12T01:49:10.008Z",
    "dateReserved": "2022-10-19T00:00:00.000Z",
    "dateUpdated": "2025-04-18T18:09:22.186Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:windows_firewall:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BE181B91-1359-4EB8-AB0C-CA1E328CD17B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"6.0.10\", \"versionEndExcluding\": \"6.0.12\", \"matchCriteriaId\": \"AD9C2674-6094-4E7B-9687-2C1C2EE3723F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"6.2.0\", \"versionEndExcluding\": \"6.2.6\", \"matchCriteriaId\": \"01D2C148-527F-4C2D-B82A-95811DB1756F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:zabbix:zabbix:6.0.12:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"C163CC6F-602E-404E-8155-14DFAC35781E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:zabbix:zabbix:6.2.6:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"550C55C9-BF75-4B88-8ACF-470FFC2F20C0\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"A Firewall Rule which allows all incoming TCP connections to all programs from any source and to all ports is created in Windows Firewall after Zabbix agent installation (MSI)\"}, {\"lang\": \"es\", \"value\": \"Una regla de firewall que permite todas las conexiones TCP entrantes a todos los programas desde cualquier fuente y a todos los puertos se crea en el Firewall de Windows despu\\u00e9s de la instalaci\\u00f3n del agente Zabbix (MSI).\"}]",
      "id": "CVE-2022-43516",
      "lastModified": "2024-11-21T07:26:41.040",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"security@zabbix.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L\", \"baseScore\": 6.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"LOW\"}, \"exploitabilityScore\": 2.2, \"impactScore\": 3.7}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 9.8, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 5.9}]}",
      "published": "2022-12-05T20:15:10.887",
      "references": "[{\"url\": \"https://support.zabbix.com/browse/ZBX-22002\", \"source\": \"security@zabbix.com\", \"tags\": [\"Exploit\", \"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://support.zabbix.com/browse/ZBX-22002\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Patch\", \"Vendor Advisory\"]}]",
      "sourceIdentifier": "security@zabbix.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"security@zabbix.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-16\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-Other\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2022-43516\",\"sourceIdentifier\":\"security@zabbix.com\",\"published\":\"2022-12-05T20:15:10.887\",\"lastModified\":\"2024-11-21T07:26:41.040\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A Firewall Rule which allows all incoming TCP connections to all programs from any source and to all ports is created in Windows Firewall after Zabbix agent installation (MSI)\"},{\"lang\":\"es\",\"value\":\"Una regla de firewall que permite todas las conexiones TCP entrantes a todos los programas desde cualquier fuente y a todos los puertos se crea en el Firewall de Windows despu\u00e9s de la instalaci\u00f3n del agente Zabbix (MSI).\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security@zabbix.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":2.2,\"impactScore\":3.7},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"security@zabbix.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-16\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:windows_firewall:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE181B91-1359-4EB8-AB0C-CA1E328CD17B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.0.10\",\"versionEndExcluding\":\"6.0.12\",\"matchCriteriaId\":\"AD9C2674-6094-4E7B-9687-2C1C2EE3723F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.2.0\",\"versionEndExcluding\":\"6.2.6\",\"matchCriteriaId\":\"01D2C148-527F-4C2D-B82A-95811DB1756F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zabbix:zabbix:6.0.12:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C163CC6F-602E-404E-8155-14DFAC35781E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zabbix:zabbix:6.2.6:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"550C55C9-BF75-4B88-8ACF-470FFC2F20C0\"}]}]}],\"references\":[{\"url\":\"https://support.zabbix.com/browse/ZBX-22002\",\"source\":\"security@zabbix.com\",\"tags\":[\"Exploit\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://support.zabbix.com/browse/ZBX-22002\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Patch\",\"Vendor Advisory\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://support.zabbix.com/browse/ZBX-22002\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T13:32:59.496Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-43516\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-04-18T18:08:51.614314Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-04-18T18:09:08.110Z\"}}], \"cna\": {\"title\": \"Zabbix Agent installer adds \\u201callow all TCP any any\\u201d firewall rule\", \"source\": {\"discovery\": \"INTERNAL\"}, \"credits\": [{\"lang\": \"en\", \"value\": \"Joshua PowellNishiyama\"}], \"metrics\": [{\"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 6.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"LOW\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"LOW\"}}], \"affected\": [{\"vendor\": \"Zabbix\", \"product\": \"Zabbix agent (MSI packages)\", \"versions\": [{\"status\": \"affected\", \"version\": \"Oct. 29, 2022 - Dec 2, 2022\"}, {\"status\": \"unaffected\", \"version\": \"Dec 3, 2022\", \"lessThan\": \"unspecified\", \"versionType\": \"custom\"}]}, {\"vendor\": \"Zabbix\", \"product\": \"Zabbix agent 2 (MSI packages)\", \"versions\": [{\"status\": \"affected\", \"version\": \"Oct. 29, 2022 - Dec 2, 2022\"}, {\"status\": \"unaffected\", \"version\": \"Dec 3, 2022\", \"lessThan\": \"unspecified\", \"versionType\": \"custom\"}]}], \"solutions\": [{\"lang\": \"en\", \"value\": \"To remediate this vulnerability, apply the updates listed in the \u0027Unaffected\u0027 section to appropriate products or use the workaround\"}], \"datePublic\": \"2022-11-30T00:00:00.000Z\", \"references\": [{\"url\": \"https://support.zabbix.com/browse/ZBX-22002\"}], \"workarounds\": [{\"lang\": \"en\", \"value\": \"If an immediate update is not possible, change the applied local firewall rule to allow the agent port only.\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.0.9\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"A Firewall Rule which allows all incoming TCP connections to all programs from any source and to all ports is created in Windows Firewall after Zabbix agent installation (MSI)\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-16\", \"description\": \"CWE-16 Configuration\"}]}], \"providerMetadata\": {\"orgId\": \"72de3e22-0555-4a0d-ae81-9249e0f0a1e8\", \"shortName\": \"Zabbix\", \"dateUpdated\": \"2022-12-05T00:00:00.000Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2022-43516\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-04-18T18:09:22.186Z\", \"dateReserved\": \"2022-10-19T00:00:00.000Z\", \"assignerOrgId\": \"72de3e22-0555-4a0d-ae81-9249e0f0a1e8\", \"datePublished\": \"2022-12-12T01:49:10.008Z\", \"assignerShortName\": \"Zabbix\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…