Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-27237

Опубликовано: 03 окт. 2025
Источник: debian
EPSS Низкий

Описание

In Zabbix Agent and Agent 2 on Windows, the OpenSSL configuration file is loaded from a path writable by low-privileged users, allowing malicious modification and potential local privilege escalation by injecting a DLL.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
zabbixnot-affectedpackage

Примечания

  • https://support.zabbix.com/browse/ZBX-27061

EPSS

Процентиль: 1%
0.00012
Низкий

Связанные уязвимости

ubuntu
4 месяца назад

In Zabbix Agent and Agent 2 on Windows, the OpenSSL configuration file is loaded from a path writable by low-privileged users, allowing malicious modification and potential local privilege escalation by injecting a DLL.

nvd
4 месяца назад

In Zabbix Agent and Agent 2 on Windows, the OpenSSL configuration file is loaded from a path writable by low-privileged users, allowing malicious modification and potential local privilege escalation by injecting a DLL.

github
4 месяца назад

In Zabbix Agent and Agent 2 on Windows, the OpenSSL configuration file is loaded from a path writable by low-privileged users, allowing malicious modification and potential local privilege escalation by injecting a DLL.

CVSS3: 7.8
fstec
4 месяца назад

Уязвимость компонентов Zabbix Agent и Agent2 системы мониторинга ИТ-инфраструктуры Zabbix, позволяющая нарушителю повысить свои привилегии

EPSS

Процентиль: 1%
0.00012
Низкий