// For flags

CVE-2022-23132

Incorrect permissions of [/var/run/zabbix] forces dac_override

Severity Score

7.3
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

During Zabbix installation from RPM, DAC_OVERRIDE SELinux capability is in use to access PID files in [/var/run/zabbix] folder. In this case, Zabbix Proxy or Server processes can bypass file read, write and execute permissions check on the file system level

Durante la instalación de Zabbix desde RPM, es usada la capacidad DAC_OVERRIDE SELinux para acceder a los archivos PID en la carpeta [/var/run/zabbix]. En este caso, los procesos del proxy o del servidor de Zabbix pueden omitir la comprobación de los permisos de lectura, escritura y ejecución de los archivos en el nivel del sistema de archivos

*Credits: Zabbix wants to thank Brian J. Murrell for reporting this issue to us
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low
Attack Vector
Local
Attack Complexity
High
Privileges Required
Low
User Interaction
Required
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-01-11 CVE Reserved
  • 2022-01-13 CVE Published
  • 2024-09-16 CVE Updated
  • 2024-09-28 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-284: Improper Access Control
  • CWE-732: Incorrect Permission Assignment for Critical Resource
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Zabbix
Search vendor "Zabbix"
Zabbix
Search vendor "Zabbix" for product "Zabbix"
>= 4.0.0 <= 4.0.36
Search vendor "Zabbix" for product "Zabbix" and version " >= 4.0.0 <= 4.0.36"
-
Affected
Zabbix
Search vendor "Zabbix"
Zabbix
Search vendor "Zabbix" for product "Zabbix"
>= 5.0.0 <= 5.0.18
Search vendor "Zabbix" for product "Zabbix" and version " >= 5.0.0 <= 5.0.18"
-
Affected
Zabbix
Search vendor "Zabbix"
Zabbix
Search vendor "Zabbix" for product "Zabbix"
>= 5.4.0 <= 5.4.8
Search vendor "Zabbix" for product "Zabbix" and version " >= 5.4.0 <= 5.4.8"
-
Affected
Zabbix
Search vendor "Zabbix"
Zabbix
Search vendor "Zabbix" for product "Zabbix"
6.0.0
Search vendor "Zabbix" for product "Zabbix" and version "6.0.0"
alpha1
Affected
Zabbix
Search vendor "Zabbix"
Zabbix
Search vendor "Zabbix" for product "Zabbix"
6.0.0
Search vendor "Zabbix" for product "Zabbix" and version "6.0.0"
alpha2
Affected
Zabbix
Search vendor "Zabbix"
Zabbix
Search vendor "Zabbix" for product "Zabbix"
6.0.0
Search vendor "Zabbix" for product "Zabbix" and version "6.0.0"
alpha3
Affected
Zabbix
Search vendor "Zabbix"
Zabbix
Search vendor "Zabbix" for product "Zabbix"
6.0.0
Search vendor "Zabbix" for product "Zabbix" and version "6.0.0"
alpha4
Affected
Zabbix
Search vendor "Zabbix"
Zabbix
Search vendor "Zabbix" for product "Zabbix"
6.0.0
Search vendor "Zabbix" for product "Zabbix" and version "6.0.0"
alpha5
Affected
Zabbix
Search vendor "Zabbix"
Zabbix
Search vendor "Zabbix" for product "Zabbix"
6.0.0
Search vendor "Zabbix" for product "Zabbix" and version "6.0.0"
alpha6
Affected
Zabbix
Search vendor "Zabbix"
Zabbix
Search vendor "Zabbix" for product "Zabbix"
6.0.0
Search vendor "Zabbix" for product "Zabbix" and version "6.0.0"
alpha7
Affected
Fedoraproject
Search vendor "Fedoraproject"
Fedora
Search vendor "Fedoraproject" for product "Fedora"
34
Search vendor "Fedoraproject" for product "Fedora" and version "34"
-
Affected
Fedoraproject
Search vendor "Fedoraproject"
Fedora
Search vendor "Fedoraproject" for product "Fedora"
35
Search vendor "Fedoraproject" for product "Fedora" and version "35"
-
Affected