CVE-2024-22116

9.9 CRITICAL

📋 TL;DR

This critical vulnerability allows administrators with restricted permissions to execute arbitrary code via the Ping script in Zabbix monitoring systems. Attackers can exploit improper input escaping in script parameters to compromise infrastructure. Organizations using affected Zabbix versions with administrator accounts are at risk.

💻 Affected Systems

Products:
  • Zabbix
Versions: Zabbix 6.0.x before 6.0.31, 7.0.x before 7.0.0beta3
Operating Systems: Linux, Windows, Other platforms running Zabbix
Default Config Vulnerable: ⚠️ Yes
Notes: Requires administrator account with script execution permissions in Monitoring Hosts section. Default installations with administrator accounts are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to execute arbitrary commands with elevated privileges, potentially leading to data theft, lateral movement, and persistent backdoor installation across the infrastructure.

🟠

Likely Case

Privilege escalation from restricted administrator to full system control, enabling attackers to modify monitoring configurations, exfiltrate sensitive data, and disrupt monitoring operations.

🟢

If Mitigated

Limited impact if proper access controls restrict administrator permissions and network segmentation isolates monitoring systems from critical infrastructure.

🌐 Internet-Facing: HIGH if Zabbix web interface is exposed to the internet, as authenticated administrators could exploit remotely.
🏢 Internal Only: HIGH as internal administrators with restricted permissions can still exploit this vulnerability to gain full system control.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated administrator access but is straightforward once credentials are obtained. The vulnerability is in default functionality with clear attack path.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Zabbix 6.0.31, 7.0.0beta3 or later

Vendor Advisory: https://support.zabbix.com/browse/ZBX-25016

Restart Required: Yes

Instructions:

1. Backup Zabbix configuration and database. 2. Download patched version from official Zabbix repository. 3. Follow Zabbix upgrade documentation for your version. 4. Restart Zabbix server and frontend services. 5. Verify functionality post-upgrade.

🔧 Temporary Workarounds

Restrict Script Permissions

all

Remove script execution permissions from restricted administrator roles in Zabbix

Navigate to Administration > User roles > Edit role > Permissions
Remove 'Execute scripts' permission from affected roles

Disable Ping Script

all

Disable or remove the Ping script functionality from Monitoring Hosts

Navigate to Configuration > Hosts > Select host > Scripts
Remove or disable Ping script for all hosts

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Zabbix servers from critical systems
  • Enforce least privilege by removing all script execution permissions from administrator roles

🔍 How to Verify

Check if Vulnerable:

Check Zabbix version via web interface (Administration > General > About) or command line: zabbix_server --version

Check Version:

zabbix_server --version | grep -o '[0-9]\+\.[0-9]\+\.[0-9]\+'

Verify Fix Applied:

Verify version is 6.0.31 or 7.0.0beta3+ and test that restricted administrators cannot execute arbitrary commands via Ping script

📡 Detection & Monitoring

Log Indicators:

  • Unusual script execution patterns in Zabbix server logs
  • Ping script executions with suspicious parameters
  • Administrator account performing unexpected script actions

Network Indicators:

  • Outbound connections from Zabbix server to unexpected destinations
  • Unusual command and control traffic patterns

SIEM Query:

source="zabbix_server.log" AND "script execution" AND ("ping" OR "arbitrary command")

🔗 References

📤 Share & Export