CVE-2022-23131

9.1 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to modify session data and escalate privileges to admin access in Zabbix Frontend when SAML SSO authentication is enabled. It affects Zabbix instances with non-default SAML authentication configured. Attackers need to know a valid Zabbix username or exploit the guest account (disabled by default).

💻 Affected Systems

Products:
  • Zabbix
Versions: Zabbix 5.4.0 to 5.4.8, 6.0.0 to 6.0.2
Operating Systems: All platforms running Zabbix
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when SAML SSO authentication is enabled (non-default configuration). Guest account must be enabled for some attack vectors.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of Zabbix Frontend with admin privileges, allowing data manipulation, system access, and potential lateral movement to connected systems.

🟠

Likely Case

Unauthorized admin access to Zabbix monitoring system, enabling configuration changes, data exfiltration, and disruption of monitoring services.

🟢

If Mitigated

Limited impact if SAML authentication is disabled or proper network segmentation isolates Zabbix systems.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires SAML authentication enabled and knowledge of a valid username. CISA has added this to Known Exploited Vulnerabilities catalog.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Zabbix 5.4.9, 6.0.3, and later versions

Vendor Advisory: https://support.zabbix.com/browse/ZBX-20350

Restart Required: Yes

Instructions:

1. Backup Zabbix configuration and database. 2. Upgrade to Zabbix 5.4.9 or 6.0.3+. 3. Restart Zabbix server and frontend services. 4. Verify SAML configuration remains functional.

🔧 Temporary Workarounds

Disable SAML Authentication

all

Temporarily disable SAML SSO authentication until patching is possible

Edit zabbix.conf.php and set SAML authentication to disabled

Disable Guest Account

all

Ensure guest account is disabled to reduce attack surface

Navigate to Administration -> Users -> Guest -> Disable

🧯 If You Can't Patch

  • Disable SAML authentication immediately
  • Implement strict network access controls to limit Zabbix frontend access to trusted IPs only

🔍 How to Verify

Check if Vulnerable:

Check Zabbix version and SAML configuration. If version is 5.4.0-5.4.8 or 6.0.0-6.0.2 with SAML enabled, system is vulnerable.

Check Version:

grep ZABBIX_VERSION /usr/share/zabbix/include/defines.inc.php

Verify Fix Applied:

Verify Zabbix version is 5.4.9+ or 6.0.3+ and test SAML authentication functionality.

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication patterns, multiple failed login attempts followed by successful admin login from same IP
  • SAML authentication errors followed by privilege escalation

Network Indicators:

  • Unusual HTTP POST requests to Zabbix frontend SAML endpoints
  • Traffic from unexpected sources to Zabbix admin interfaces

SIEM Query:

source="zabbix" AND (event="authentication failure" OR event="privilege escalation")

🔗 References

📤 Share & Export