CVE-2025-49643

6.5 MEDIUM

📋 TL;DR

An authenticated Zabbix user (including Guest accounts) can send specially crafted parameters to /imgstore.php, causing excessive CPU consumption on the webserver. This leads to potential denial of service by overwhelming server resources. All Zabbix installations with vulnerable versions are affected.

💻 Affected Systems

Products:
  • Zabbix
Versions: Specific versions not detailed in reference; check Zabbix advisory for exact range
Operating Systems: All platforms running Zabbix
Default Config Vulnerable: ⚠️ Yes
Notes: Guest accounts are enabled by default in Zabbix, increasing attack surface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete webserver unavailability due to CPU exhaustion, disrupting monitoring and potentially affecting dependent systems.

🟠

Likely Case

Degraded webserver performance causing slow response times or intermittent outages for Zabbix web interface users.

🟢

If Mitigated

Minimal impact with proper authentication controls and rate limiting in place.

🌐 Internet-Facing: HIGH - Internet-facing Zabbix instances are directly accessible to attackers with valid credentials.
🏢 Internal Only: MEDIUM - Internal attackers with authenticated access can still exploit, but attack surface is reduced.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated access but Guest accounts qualify; exploitation involves simple HTTP requests with crafted parameters.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check ZBX-27284 for specific patched versions

Vendor Advisory: https://support.zabbix.com/browse/ZBX-27284

Restart Required: Yes

Instructions:

1. Check current Zabbix version
2. Download and apply patch from Zabbix repository
3. Restart Zabbix server and web services
4. Verify fix by testing /imgstore.php endpoint

🔧 Temporary Workarounds

Disable Guest Access

all

Remove or disable Guest user accounts to reduce attack surface.

UPDATE users SET attempt_failed=10 WHERE alias='guest';
UPDATE users SET attempt_clock=UNIX_TIMESTAMP() WHERE alias='guest';

Implement Rate Limiting

linux

Configure web server or WAF to limit requests to /imgstore.php.

# For nginx: limit_req_zone $binary_remote_addr zone=zabbix:10m rate=10r/s;
# Add to location block: limit_req zone=zabbix burst=20;

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Zabbix server from untrusted networks.
  • Deploy a web application firewall (WAF) with DoS protection rules for /imgstore.php.

🔍 How to Verify

Check if Vulnerable:

Test by sending crafted parameters to /imgstore.php as authenticated user and monitor CPU spikes.

Check Version:

zabbix_server --version | grep version

Verify Fix Applied:

After patching, attempt exploitation again; CPU should not spike abnormally.

📡 Detection & Monitoring

Log Indicators:

  • High frequency requests to /imgstore.php in web server logs
  • CPU usage alerts from Zabbix server monitoring

Network Indicators:

  • Unusual traffic patterns to /imgstore.php endpoint
  • Multiple authenticated sessions from single source

SIEM Query:

source="zabbix_access.log" AND uri="/imgstore.php" AND status=200 | stats count by src_ip

🔗 References

📤 Share & Export