Security vulnerabilities: Network monitoring tool Zabbix can leak passwords

Among other things, Zabbix is threatened by a critical malware vulnerability. Versions secured against this are available for download.

listen Print view

(Image: AFANASEV IVAN/Shutterstock.com)

2 min. read

In the latest version of the network monitoring tool Zabbix, the developers have closed a total of eight security vulnerabilities. After successful attacks, attackers can, for example, view passwords in plain text or even execute malicious code.

Admins can find more information on the vulnerabilities and threatened versions in the warning messages linked below. The most dangerous is a vulnerability (CVE-2024-22116), which attackers can exploit to execute their own code in the context of the ping script. However, this only works if attackers are already admins with limited authorizations. Despite this hurdle, the vulnerability is considered"critical" because it can be used to compromise entire IT infrastructures.

Videos by heise

Furthermore, the front-end audit log displays passwords in plain text (CVE-2024-36460"high"). Attackers can also paralyze systems via a DoS attack (CVE-2024-36462"high") or compromise the integrity of a Zabbix installation (CVE-2024-22121"medium").

The developers state that they have closed the gaps in versions 5.0.43rc1, 6.0.31rc1, 6.4.16rc1 and 7.0.0rc3.

List sorted by threat level in descending order:

(des)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.