CVE-2024-42326
📋 TL;DR
A use-after-free vulnerability in Zabbix's browser.c es_browser_get_variant function could allow memory corruption. This affects Zabbix installations where the vulnerable component is accessible, potentially leading to crashes or code execution. Only Zabbix users with affected versions are impacted.
💻 Affected Systems
- Zabbix
📦 What is this software?
Zabbix by Zabbix
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to complete system compromise of the Zabbix server
Likely Case
Application crash causing denial of service for Zabbix monitoring functionality
If Mitigated
Limited impact due to memory corruption being contained within the application
🎯 Exploit Status
Use-after-free vulnerabilities typically require specific memory manipulation knowledge; authentication status unclear from available information
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Zabbix 7.0.5
Vendor Advisory: https://support.zabbix.com/browse/ZBX-25622
Restart Required: Yes
Instructions:
1. Download Zabbix 7.0.5 from official repository. 2. Follow Zabbix upgrade documentation for your platform. 3. Restart Zabbix server and web interface services.
🔧 Temporary Workarounds
Network Access Restriction
allLimit access to Zabbix web interface to trusted networks only
# Configure firewall rules to restrict Zabbix port access
# Example: iptables -A INPUT -p tcp --dport 80,443 -s trusted_network -j ACCEPT
🧯 If You Can't Patch
- Implement strict network segmentation to isolate Zabbix from untrusted networks
- Enable comprehensive logging and monitoring for unusual Zabbix process behavior
🔍 How to Verify
Check if Vulnerable:
Check Zabbix version via web interface (Administration → General → About) or command line: zabbix_server --version
Check Version:
zabbix_server --version | grep 'Zabbix'
Verify Fix Applied:
Confirm version shows 7.0.5 or higher after upgrade
📡 Detection & Monitoring
Log Indicators:
- Zabbix process crashes in system logs
- Memory access violation errors in Zabbix logs
Network Indicators:
- Unusual requests to Zabbix web interface endpoints
SIEM Query:
source="zabbix.log" AND ("segmentation fault" OR "memory corruption" OR "use after free")