Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2024-22120 β€” AI Deep Analysis Summary

CVSS 9.1 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Zabbix suffers from a **Time-Based Blind SQL Injection** due to unsanitized input in the `clientip` field within the Audit Log.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: **CWE-20: Improper Input Validation**. The system fails to clean the `clientip` field before logging it into the audit database.…

Q3Who is affected? (Versions/Components)

πŸ“¦ **Affected Versions**: β€’ **Zabbix 6.0.0 - 6.0.27** β€’ **Zabbix 6.4.0 - 6.4.12** β€’ **Zabbix 7.0.0alpha1** ⚠️ If you run these versions, you are at risk!

Q4What can hackers do? (Privileges/Data)

πŸ’» **Attacker Capabilities**: β€’ **Full RCE**: Execute arbitrary commands on the server. β€’ **Data Exfiltration**: Access sensitive monitoring data. β€’ **Privilege Escalation**: Gain administrative control. πŸ”‘ Requires a **l…

Q5Is exploitation threshold high? (Auth/Config)

πŸ” **Exploitation Threshold**: β€’ **Auth Required**: Yes, needs a valid session (low-privilege user). β€’ **Config Required**: User must have permission to execute scripts. β€’ **Network**: Remote exploitation possible (AV:N)…

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ’£ **Public Exploits**: **YES**. Multiple PoCs are available on GitHub: β€’ `CVE-2024-22120-RCE` (Time-based SQLi β†’ RCE) β€’ `CVE-2024-22120-RCE-with-gopher` (SSRF/XXE via Gopher) β€’ Nuclei templates for automated scanning. πŸ”₯ …

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: 1. **Scan**: Use Nuclei templates (`CVE-2024-22120.yaml`). 2. **Verify**: Check if your Zabbix version is in the affected list. 3.…

Q8Is it fixed officially? (Patch/Mitigation)

🩹 **Official Fix**: **YES**. Zabbix has acknowledged the issue (ZBX-24505). Users should **update immediately** to the latest patched version of Zabbix 6.0, 6.4, or 7.0.…

Q9What if no patch? (Workaround)

πŸ›‘ **No Patch Workaround**: 1. **Restrict Permissions**: Remove script execution rights from low-privilege users. 2. **Network Segmentation**: Limit access to the Zabbix server interface. 3.…

Q10Is it urgent? (Priority Suggestion)

🚨 **Urgency**: **CRITICAL (P1)**. β€’ **CVSS Score**: High (AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H). β€’ **Impact**: Full RCE. β€’ **Availability**: Easy to exploit with public tools. ⏳ **Action**: Patch immediately or apply str…