Local Privilege Escalation in Zabbix Agent on Windows
CVE-2025-27237
Key Information:
Badges
What is CVE-2025-27237?
The Zabbix Agent and Agent 2 on Windows are susceptible to a vulnerability that allows low-privileged users to alter the OpenSSL configuration file. Because this file is located in a writable path, malicious actors can inject a Dynamic Link Library (DLL), leading to potential environment compromise and local privilege escalation. Organizations using these products should assess their configurations and apply recommended security practices to mitigate the risks associated with this flaw.
Affected Version(s)
Zabbix 6.0.0 <= 6.0.40
Zabbix 7.0.0 <= 7.0.17
Zabbix 7.2.0 <= 7.2.11
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
