Lucene search

K
vulnrichmentZabbixVULNRICHMENT:CVE-2024-22122
HistoryAug 09, 2024 - 8:46 a.m.

CVE-2024-22122 AT(GSM) Command Injection

2024-08-0908:46:21
CWE-77
Zabbix
github.com
2
zabbix
sms notifications
at command injection
cve-2024-22122
validation
web
zabbix server
modem

CVSS3

3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:N

AI Score

8

Confidence

Low

EPSS

0

Percentile

9.5%

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

Zabbix allows to configure SMS notifications. AT command injection occurs on “Zabbix Server” because there is no validation of “Number” field on Web nor on Zabbix server side. Attacker can run test of SMS providing specially crafted phone number and execute additional AT commands on modem.

CNA Affected

[
  {
    "repo": "https://git.zabbix.com/",
    "vendor": "Zabbix",
    "modules": [
      "Server",
      "Frontend"
    ],
    "product": "Zabbix",
    "versions": [
      {
        "status": "affected",
        "changes": [
          {
            "at": "5.0.43rc1",
            "status": "unaffected"
          }
        ],
        "version": "5.0.0",
        "versionType": "git",
        "lessThanOrEqual": "5.0.42"
      },
      {
        "status": "affected",
        "changes": [
          {
            "at": "6.0.31rc1",
            "status": "unaffected"
          }
        ],
        "version": "6.0.0",
        "versionType": "git",
        "lessThanOrEqual": "6.0.30"
      },
      {
        "status": "affected",
        "changes": [
          {
            "at": "6.4.16rc1",
            "status": "unaffected"
          }
        ],
        "version": "6.4.0",
        "versionType": "git",
        "lessThanOrEqual": "6.4.15"
      },
      {
        "status": "affected",
        "changes": [
          {
            "at": "7.0.0rc3",
            "status": "unaffected"
          }
        ],
        "version": "7.0.0alpha1",
        "versionType": "git",
        "lessThanOrEqual": "7.0.0rc2"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

CVSS3

3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:N

AI Score

8

Confidence

Low

EPSS

0

Percentile

9.5%

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial