A new critical Remote Code Execution (RCE) vulnerability impacting Zabbix has been reported. It has been assigned the reference CVE-2024-22116 and a CVSS 3.1 score of 9.9. The Stormshield Customer Security Lab details our protection offerings.

This vulnerability impacts the following versions of the product:

  • 4.0 to 6.4.15 ;
  • 0.0 Alpha 1 to 7.0.0 RC2.

 

Initial vector attack of the Zabbix vulnerability

This vulnerability allows an administrator with limited permissions to initiate a remote code execution on the Zabbix server. This could be used to deploy a remote shell in order to gain control of the server or dump all the user’s passwords of the platform.

 

Technical details of the Zabbix vulnerability

The underlying API of GeoServer does not include security checks on specific values of some parameters. This can lead to a java code interpretation sent through HTTP requests. This code will be executed using the execution context of the GeoServer server.

 

Attack modelling with MITRE ATT&CK

MITRE ATT&CK

  • T1068 (Exploitation for Privilege Escalation)
  • T1203 (Exploitation for Client Execution)

CWE

  • CWE-94 Improper Control of Generation of Code ('Code Injection')

 

How to protect against the Zabbix vulnerability with Stormshield Network Security

Protection against CVE-2024-22116

Stormshield Network Security (SNS) firewalls detect and block exploitation of CVE-2024-22116 with the protocol inspection:

  • http:client:data.180: Exploitation of a RCE in Zabbix (CVE-2024-22116)

Confidence index for the protection offered by Stormshield

Confidence index for the absence of false positives

Recommandations regarding the Zabbix vulnerability

It is recommended to update the Zabbix application to one of the following versions:

  • 6.4.16 RC1 or above ;
  • 7.0.0 RC3 or above.

Share on

[juiz_sps buttons="facebook, twitter, linkedin, mail"]
Need more information about Stormshield protection? The Technical Support teams are at your disposal to help you. Contact them through the incident manager located in the MyStormshield private area. To access it, select the menu "Technical Support / Report an incident / Track an incident".
Stormshield's Cyber Threat Intelligence team has two primary missions: to study cyber threats to understand them and to continuously improve Stormshield product protections. All with the goal of contributing to the cybersecurity community's effort to address cyber threats.