Users can directly modify memory pointers in the JavaScript engine
CVE-2024-36461

9.1CRITICAL

Key Information:

Vendor

Zabbix

Status
Vendor
CVE Published:
12 August 2024

What is CVE-2024-36461?

The vulnerability in Zabbix allows users to directly manipulate memory pointers within the JavaScript engine. This can lead to serious security implications, enabling potential attackers to exploit the affected systems. The flaw specifically allows for unauthorized changes that could compromise the integrity and confidentiality of data processed by Zabbix. Proper security assessments and updates are necessary to mitigate the risks associated with this vulnerability.

Affected Version(s)

Zabbix 6.0.0 <= 6.0.30

Zabbix 6.4.0 <= 6.4.15

Zabbix 7.0.0alpha1 <= 7.0.0

References

CVSS V3.1

Score:
9.1
Severity:
CRITICAL
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Zabbix extends its gratitude to Pavel Voit (pavelvoit) for submitting this report on the HackerOne bug bounty platform
.