Users can directly modify memory pointers in the JavaScript engine
CVE-2024-36461
8.8HIGH
What is CVE-2024-36461?
The vulnerability in Zabbix allows users to directly manipulate memory pointers within the JavaScript engine. This can lead to serious security implications, enabling potential attackers to exploit the affected systems. The flaw specifically allows for unauthorized changes that could compromise the integrity and confidentiality of data processed by Zabbix. Proper security assessments and updates are necessary to mitigate the risks associated with this vulnerability.
Affected Version(s)
Zabbix 6.0.0 <= 6.0.30
Zabbix 6.4.0 <= 6.4.15
Zabbix 7.0.0alpha1 <= 7.0.0
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Zabbix extends its gratitude to Pavel Voit (pavelvoit) for submitting this report on the HackerOne bug bounty platform