关键漏洞信息 CVE ID: CVE-2025-27233 CVSS Score: 5.7 (Medium) CVSS Vector: CVSS:4.0/AV:A/AC:H/AT:P/PR:H/UI:N/VC:H/Vi:N/VA:N/SC:N/SI:N/SA:N Affected Components: Agent2 plugin Summary: Zabbix Agent 2 smartctl plugin argument injection in Zabbix 6.0 and later. Description: Zabbix Agent 2 smartctl plugin does not properly sanitize smart.disk.get parameters, allowing an attacker to inject unexpected arguments into the smartctl command. This can be used to leak the NTLMv2 hash from a Windows system. Known Attack Vectors: An attacker could request Agent 2 to monitor a metric with malicious arguments in the smart.disk.get metric. Affected and Fix Versions: - Affected: 6.0.0 - 6.0.39 → Fixed: 6.0.40 - Affected: 7.0.0 - 7.0.10 → Fixed: 7.0.11 - Affected: 7.2.0 - 7.2.4 → Fixed: 7.2.5 Mitigation: Update the affected components to their respective fixed versions. Workarounds: Remove smartctl or use strict item key parameter validation with AllowKey/DenyKey. Acknowledgements: Zabbix wants to thank kelsier for submitting this report on the HackerOne bug bounty platform.