FKIE_CVE-2024-22123

Vulnerability from fkie_nvd - Published: 2024-08-12 13:38 - Updated: 2025-11-03 22:16
Summary
Setting SMS media allows to set GSM modem file. Later this file is used as Linux device. But due everything is a file for Linux, it is possible to set another file, e.g. log file and zabbix_server will try to communicate with it as modem. As a result, log file will be broken with AT commands and small part for log file content will be leaked to UI.
Impacted products
Vendor Product Version
zabbix zabbix *
zabbix zabbix *
zabbix zabbix *
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5950D0D-9DFF-4B36-9AAF-43CBCEFE7101",
              "versionEndIncluding": "5.0.42",
              "versionStartIncluding": "5.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1D26F5C-A94F-4273-81D7-7DDF7541C3E7",
              "versionEndIncluding": "6.0.30",
              "versionStartIncluding": "6.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0DA6900-EB3E-4867-BD97-243686EECADD",
              "versionEndIncluding": "6.4.15",
              "versionStartIncluding": "6.4.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha1:*:*:*:*:*:*",
              "matchCriteriaId": "93EB5757-7F98-4428-9616-C30A647A6612",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha2:*:*:*:*:*:*",
              "matchCriteriaId": "DA00BDB5-433F-44E5-87AC-DA01C64B5DB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha3:*:*:*:*:*:*",
              "matchCriteriaId": "98C46C92-9D86-45CD-88FE-DFBB5502BB88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha4:*:*:*:*:*:*",
              "matchCriteriaId": "B568E6DD-A6D1-4402-BB40-7DA2596A5BC8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha5:*:*:*:*:*:*",
              "matchCriteriaId": "B9C3673B-8459-4C63-8E90-724D1D42A8BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha6:*:*:*:*:*:*",
              "matchCriteriaId": "7C9F6957-7526-4852-A579-DE556DBFAA97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha7:*:*:*:*:*:*",
              "matchCriteriaId": "81A7A191-93DE-4C5D-963E-E8890FF7AACA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha8:*:*:*:*:*:*",
              "matchCriteriaId": "AEE202D5-3C88-43A5-9328-FC78D0B9B8CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha9:*:*:*:*:*:*",
              "matchCriteriaId": "F88BFB75-7951-47D5-941F-3839E9E31FFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "8216247E-C160-4D2C-906E-9D8CD731B5C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "06548219-0DC3-4B5B-85D1-B1EE0FA30CD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "4D23985B-2F4D-41F6-B9D6-7B184FC7E447",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "97964B9B-6A5E-4547-8886-E81B0849A876",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "40992B5F-0D83-4D5C-9188-E84C369FF92F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Setting SMS media allows to set GSM modem file. Later this file is used as Linux device. But due everything is a file for Linux, it is possible to set another file, e.g. log file and zabbix_server will try to communicate with it as modem. As a result, log file will be broken with AT commands and small part for log file content will be leaked to UI."
    },
    {
      "lang": "es",
      "value": "La configuraci\u00f3n de medios SMS permite configurar el archivo del m\u00f3dem GSM. Posteriormente este archivo se utiliza como dispositivo Linux. Pero debido a que todo es un archivo para Linux, es posible configurar otro archivo, por ejemplo, un archivo de registro y zabbix_server intentar\u00e1 comunicarse con \u00e9l como m\u00f3dem. Como resultado, el archivo de registro se romper\u00e1 con los comandos AT y una peque\u00f1a parte del contenido del archivo de registro se filtrar\u00e1 a la interfaz de usuario."
    }
  ],
  "id": "CVE-2024-22123",
  "lastModified": "2025-11-03T22:16:46.550",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 2.7,
          "baseSeverity": "LOW",
          "confidentialityImpact": "NONE",
          "integrityImpact": "LOW",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.2,
        "impactScore": 1.4,
        "source": "security@zabbix.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 2.7,
          "baseSeverity": "LOW",
          "confidentialityImpact": "NONE",
          "integrityImpact": "LOW",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.2,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-08-12T13:38:16.520",
  "references": [
    {
      "source": "security@zabbix.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-25013"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.debian.org/debian-lts-announce/2024/10/msg00000.html"
    }
  ],
  "sourceIdentifier": "security@zabbix.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-94"
        }
      ],
      "source": "security@zabbix.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-94"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…