Описание
Zabbix Agent 2 smartctl plugin does not properly sanitize smart.disk.get parameters, allowing an attacker to inject unexpected arguments into the smartctl command. This can be used to leak the NTLMv2 hash from a Windows system.
Пакеты
| Пакет | Статус | Версия исправления | Релиз | Тип |
|---|---|---|---|---|
| zabbix | unfixed | package | ||
| zabbix | not-affected | bullseye | package |
Примечания
https://support.zabbix.com/browse/ZBX-26987
Internal issue DEV-4211 (relates to CVE-2025-27234 for 5.0.x codebase)
Fixed by: https://github.com/zabbix/zabbix/commit/6abcdb5010d19cc6fb3e73f1cc3f127afb5d151f (6.0.40rc1)
Fixed by: https://github.com/zabbix/zabbix/commit/f0625dd11ed5e043d330f8f22ac8eecb63272106 (7.0.11rc2)
Fixed by: https://github.com/zabbix/zabbix/commit/70b7a00e94db1c0dd16384d81cc40659de57fb04 (7.2.5rc2)
Fixed upstream in 6.0.40, 7.0.11, 7.2.5
EPSS
Связанные уязвимости
Zabbix Agent 2 smartctl plugin does not properly sanitize smart.disk.get parameters, allowing an attacker to inject unexpected arguments into the smartctl command. This can be used to leak the NTLMv2 hash from a Windows system.
Zabbix Agent 2 smartctl plugin does not properly sanitize smart.disk.get parameters, allowing an attacker to inject unexpected arguments into the smartctl command. This can be used to leak the NTLMv2 hash from a Windows system.
Zabbix Agent 2 smartctl plugin does not properly sanitize smart.disk.get parameters, allowing an attacker to inject unexpected arguments into the smartctl command. This can be used to leak the NTLMv2 hash from a Windows system.
Уязвимость компонента Zabbix Agent 2 системы мониторинга ИТ-инфраструктуры Zabbix, позволяющая нарушителю раскрыть защищаемую информацию
EPSS