Zabbix Server Vulnerable to AT Command Injection via SMS Notifications
CVE-2024-22122

9.1CRITICAL

Key Information:

Vendor

Zabbix

Status
Vendor
CVE Published:
12 August 2024

What is CVE-2024-22122?

An input validation issue present in Zabbix Server allows an attacker to exploit the SMS notification feature by injecting malicious AT commands through a specially crafted phone number. Specifically, the lack of validation for the 'Number' field on both the web interface and the server side enables remote adversaries to craft SMS notifications that can execute unauthorized commands on the connected modem. This vulnerability poses a significant threat to the integrity and availability of the system, potentially compromising sensitive operations.

Affected Version(s)

Zabbix 5.0.0 <= 5.0.42

Zabbix 6.0.0 <= 6.0.30

Zabbix 6.4.0 <= 6.4.15

References

CVSS V3.1

Score:
9.1
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Zabbix wants to thank Maksim Tiukov (mf0cuz) who submitted this report in HackerOne bug bounty platform
.