CVE-2024-22114

4.3 MEDIUM

📋 TL;DR

This CVE describes an information disclosure vulnerability in Zabbix where unauthenticated users can access host statistics through the System Information Widget. This affects Zabbix installations with improperly configured permissions, allowing unauthorized viewing of system metrics.

💻 Affected Systems

Products:
  • Zabbix
Versions: Zabbix 6.0.0 through 6.0.28, 6.4.0 through 6.4.13, 7.0.0 through 7.0.0beta2
Operating Systems: All platforms running affected Zabbix versions
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Zabbix installations with the System Information Widget enabled in Global View Dashboard.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could map the entire infrastructure by viewing host counts and statistics, potentially identifying valuable targets for further attacks.

🟠

Likely Case

Unauthorized users gain visibility into system metrics and host counts, revealing information about the monitoring environment.

🟢

If Mitigated

With proper authentication and authorization controls, impact is limited to authorized users only.

🌐 Internet-Facing: MEDIUM - If Zabbix interface is exposed to the internet, unauthorized users could access system information.
🏢 Internal Only: LOW - Internal network access would still be required, reducing exposure surface.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires access to the Zabbix web interface but no authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Zabbix 6.0.29, 6.4.14, 7.0.0beta3

Vendor Advisory: https://support.zabbix.com/browse/ZBX-25015

Restart Required: No

Instructions:

1. Backup your Zabbix configuration and database. 2. Download the patched version from Zabbix website. 3. Follow Zabbix upgrade documentation for your specific version. 4. Verify the fix by testing access controls.

🔧 Temporary Workarounds

Disable System Information Widget

all

Remove or disable the System Information Widget from Global View Dashboard

Navigate to Zabbix web interface > Monitoring > Dashboard > Edit Global View > Remove System Information Widget

Restrict Dashboard Access

all

Configure user permissions to restrict access to Global View Dashboard

Navigate to Zabbix web interface > Administration > User groups > Edit permissions > Remove Global View access

🧯 If You Can't Patch

  • Implement network segmentation to restrict access to Zabbix interface
  • Configure web application firewall rules to block unauthorized access to dashboard endpoints

🔍 How to Verify

Check if Vulnerable:

Attempt to access Zabbix Global View Dashboard as an unauthenticated user and check if host statistics are visible.

Check Version:

zabbix_server --version 2>/dev/null | head -1 || echo "Check Zabbix web interface footer for version"

Verify Fix Applied:

After patching, verify that unauthenticated users cannot access host statistics in the System Information Widget.

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated access attempts to dashboard endpoints in Zabbix web server logs

Network Indicators:

  • Unusual requests to /zabbix/zabbix.php?action=dashboard.view from unauthenticated IPs

SIEM Query:

source="zabbix_access.log" AND (uri="/zabbix/zabbix.php?action=dashboard.view" OR uri="/zabbix/dashboard.php") AND status=200 AND user="-"

🔗 References

📤 Share & Export