CVE-2024-36467

7.5 HIGH

📋 TL;DR

This vulnerability allows authenticated users with API access to escalate their privileges by adding themselves to any group, including administrative groups like Zabbix Administrators. It affects Zabbix monitoring systems where users have access to the user.update API endpoint. The default User role is sufficient to exploit this vulnerability.

💻 Affected Systems

Products:
  • Zabbix
Versions: Zabbix 7.0.0alpha1 to 7.0.0beta1
Operating Systems: All platforms running affected Zabbix versions
Default Config Vulnerable: ⚠️ Yes
Notes: Affects installations where users have API access with the default User role. Groups that are disabled or have restricted GUI access are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker gains administrative privileges, enabling complete control over the Zabbix monitoring system, including modifying configurations, accessing sensitive monitoring data, and potentially using Zabbix as a pivot point to attack monitored systems.

🟠

Likely Case

Malicious or compromised users escalate their privileges to gain administrative access, allowing them to modify monitoring configurations, suppress alerts, or access sensitive infrastructure data.

🟢

If Mitigated

Impact is limited to authorized users who already have API access but cannot escalate beyond their intended permissions.

🌐 Internet-Facing: MEDIUM - If Zabbix API is exposed to the internet, attackers could exploit this after obtaining valid credentials through other means.
🏢 Internal Only: HIGH - Internal users with legitimate API access can easily escalate privileges, posing significant insider threat risks.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated API access but is straightforward once credentials are obtained. The vulnerability is in the user.update API endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Zabbix 7.0.0beta2

Vendor Advisory: https://support.zabbix.com/browse/ZBX-25614

Restart Required: No

Instructions:

1. Upgrade to Zabbix 7.0.0beta2 or later. 2. No database schema changes required. 3. The fix is included in the standard upgrade process.

🔧 Temporary Workarounds

Restrict API Access

all

Limit API access to only trusted users and applications. Remove API access from users who don't require it.

# Review and modify user permissions in Zabbix GUI or via API
# Remove API access from unnecessary users

Implement API Rate Limiting

all

Configure rate limiting on API endpoints to detect and prevent suspicious privilege escalation attempts.

# Configure web server rate limiting (e.g., nginx, Apache)
# Implement application-level rate limiting if available

🧯 If You Can't Patch

  • Implement strict access controls and monitor API usage for privilege escalation attempts.
  • Regularly audit user permissions and group memberships to detect unauthorized changes.

🔍 How to Verify

Check if Vulnerable:

Check Zabbix version via GUI (Administration → General → About) or API. If version is between 7.0.0alpha1 and 7.0.0beta1, the system is vulnerable.

Check Version:

zabbix_server --version | grep version

Verify Fix Applied:

After upgrading to 7.0.0beta2 or later, verify that users with default User role cannot add themselves to administrative groups via the user.update API endpoint.

📡 Detection & Monitoring

Log Indicators:

  • API calls to user.update endpoint with usergrp.add parameter
  • Unexpected changes to user group memberships
  • Users added to administrative groups

Network Indicators:

  • Increased API traffic to user.update endpoint
  • Patterns of privilege escalation attempts

SIEM Query:

source="zabbix" AND (api_method="user.update" AND parameters CONTAINS "usergrp.add")

🔗 References

📤 Share & Export