CVE-2024-36460

8.1 HIGH

📋 TL;DR

This vulnerability in Zabbix's front-end audit log allows unauthorized viewing of plaintext passwords. Attackers with access to the audit log interface can see user passwords in clear text. This affects all Zabbix administrators and users whose credentials are logged.

💻 Affected Systems

Products:
  • Zabbix
Versions: Zabbix 6.0.0 through 6.0.30, 7.0.0 through 7.0.0beta2
Operating Systems: All platforms running affected Zabbix versions
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Zabbix installations with audit logging enabled for password-related events.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full credential compromise leading to complete system takeover, lateral movement, and data exfiltration.

🟠

Likely Case

Privileged account compromise allowing attackers to modify monitoring configurations, create backdoors, or access sensitive infrastructure data.

🟢

If Mitigated

Limited exposure if audit log access is properly restricted and monitored.

🌐 Internet-Facing: HIGH if Zabbix web interface is exposed to internet without proper authentication and access controls.
🏢 Internal Only: MEDIUM as internal attackers or compromised accounts could still access the audit log.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to Zabbix front-end with appropriate permissions to view audit logs.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Zabbix 6.0.31, 7.0.0beta3 and later

Vendor Advisory: https://support.zabbix.com/browse/ZBX-25017

Restart Required: No

Instructions:

1. Upgrade to Zabbix 6.0.31 or 7.0.0beta3+. 2. Apply patches from vendor repository. 3. Verify passwords are no longer displayed in plaintext in audit logs.

🔧 Temporary Workarounds

Restrict Audit Log Access

all

Limit access to audit log functionality to only essential administrators.

# Configure Zabbix user permissions to restrict 'Audit log' access
# Edit user roles in Administration -> Users -> Permissions

Disable Password Audit Logging

linux

Temporarily disable audit logging for password-related events.

# In zabbix_server.conf: AuditLogEnable=0
# Or configure specific audit log filters to exclude password events

🧯 If You Can't Patch

  • Implement strict access controls to audit log interface with multi-factor authentication.
  • Monitor audit log access and set alerts for any unauthorized viewing attempts.

🔍 How to Verify

Check if Vulnerable:

Login to Zabbix web interface, navigate to Audit log, check if password fields show plaintext values.

Check Version:

zabbix_server --version | grep 'Zabbix'

Verify Fix Applied:

After patching, verify that passwords appear as asterisks or are not displayed in audit logs.

📡 Detection & Monitoring

Log Indicators:

  • Multiple audit log access events from unusual users or IPs
  • Audit log queries filtering for password-related events

Network Indicators:

  • Unusual patterns of HTTP requests to /zabbix/auditlog.php

SIEM Query:

source="zabbix" AND (url="/auditlog" OR event_description="password") | stats count by src_ip, user

🔗 References

📤 Share & Export