Vulnerability Description
Zabbix Frontend provides a feature that allows admins to maintain the installation and ensure that only certain IP addresses can access it. In this way, any user will not be able to access the Zabbix Frontend while it is being maintained and possible sensitive data will be prevented from being disclosed. An attacker can bypass this protection and access the instance using IP address not listed in the defined range.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Zabbix | Frontend | >= 4.0.0, <= 4.0.44 |
Related Weaknesses (CWE)
References
- https://lists.debian.org/debian-lts-announce/2023/08/msg00027.html
- https://support.zabbix.com/browse/ZBX-22050ExploitVendor Advisory
- https://lists.debian.org/debian-lts-announce/2023/08/msg00027.html
- https://lists.debian.org/debian-lts-announce/2024/10/msg00000.html
- https://support.zabbix.com/browse/ZBX-22050ExploitVendor Advisory
FAQ
What is CVE-2022-43515?
CVE-2022-43515 is a vulnerability with a CVSS score of 5.3 (MEDIUM). Zabbix Frontend provides a feature that allows admins to maintain the installation and ensure that only certain IP addresses can access it. In this way, any user will not be able to access the Zabbix ...
How severe is CVE-2022-43515?
CVE-2022-43515 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-43515?
Check the references section above for vendor advisories and patch information. Affected products include: Zabbix Frontend.