Restricted Access Leads to Infrastructure Compromise
CVE-2024-22116
What is CVE-2024-22116?
The vulnerability identified as CVE-2024-22116 in the Zabbix monitoring solution allowed administrators with restricted permissions to execute arbitrary code via the Ping script in the Monitoring Hosts section. This posed a serious risk of infrastructure compromise. The vulnerability affected versions 6.4.0 to 6.4.15 and 7.0.0alpha1 to 7.0.0rc2, with a CVSS score of 9.9. Zabbix released patched versions 6.4.16rc1 and 7.0.0rc3 to fix the issue and urged users to upgrade to these versions immediately to prevent potential exploitation. No known ransomware groups have exploited this vulnerability.
Affected Version(s)
Zabbix 6.4.9 <= 6.4.15
Zabbix 7.0.0alpha1 <= 7.0.0rc2
News Articles

Zabbix Server Vulnerability Lets Attacker Execute Arbitrary Code Via Ping Script
A critical security vulnerability, identified as CVE-2024-22116, has been patched in Zabbix, a popular monitoring solution.
References
CVSS V3.1
Timeline
- đź“°
First article discovered by CybersecurityNews
Vulnerability published
Vulnerability Reserved