Zabbix Vulnerabilities Allow Remote Attacks
Summary
CERT-Bund has issued a security advisory for Zabbix, detailing multiple vulnerabilities with a CVSS base score of 8.8. These vulnerabilities affect various Zabbix versions and allow remote attackers to disclose information, inject shell commands, perform SQL injection, and cause denial of service.
What changed
CERT-Bund has released a security advisory (WID-SEC-2026-0857) concerning critical vulnerabilities in Zabbix, a popular open-source network monitoring system. The advisory highlights multiple flaws, collectively rated with a high CVSS base score of 8.8, that can be exploited by attackers from an adjacent network. Successful exploitation could lead to information disclosure, shell command injection, SQL injection, and denial of service attacks. The affected versions include Zabbix versions prior to 7.4.3, 7.0.19, 7.2.13, 6.0.41, and several other specific patch levels across these major releases.
Organizations utilizing Zabbix should immediately review their deployed versions against the advisory's list of affected products. Mitigation strategies are available, and it is strongly recommended to update to the patched versions as soon as possible to prevent exploitation. Failure to address these vulnerabilities could result in significant security breaches, including unauthorized system access and data compromise. The advisory indicates that remote attacks are possible, emphasizing the urgency of patching.
What to do next
- Review Zabbix versions against advisory WID-SEC-2026-0857
- Apply available patches or update to non-vulnerable Zabbix versions
- Implement network segmentation and access controls for Zabbix instances
Source document (simplified)
[WID-SEC-2026-0857] Zabbix: Mehrere Schwachstellen CVSS Base Score 8.8 (hoch) CVSS Temporal Score 7.7 (hoch) Remoteangriff ja Datum 24.03.2026 Stand 25.03.2026 Mitigation ja
Betroffene Systeme
Betriebssystem
- Linux
- Sonstiges
- UNIX
Produktbeschreibung
Zabbix ist ein Open-Source Netzwerk-Monitoringsystem.
Produkte
24.03.2026
- Zabbix Zabbix <7.4.3
Zabbix Zabbix <7.0.19
Zabbix Zabbix <7.2.13
Zabbix Zabbix <6.0.41
Zabbix Zabbix <7.0.22
Zabbix Zabbix <7.2.15
Zabbix Zabbix <7.4.6
Zabbix Zabbix <7.4.7
Zabbix Zabbix <7.0.23
Zabbix Zabbix <6.0.44
Angriff
Angriff
Ein Angreifer aus einem angrenzenden Netzwerk kann mehrere Schwachstellen in Zabbix ausnutzen, um Informationen offenzulegen, um Shell-Befehle einschleusen, um eine SQL Injection durchzuführen und um einen Denial of Service zu verursachen. CVE Informationen Versionshistorie Feedback zum Advisory geben
Named provisions
Related changes
Source
Classification
Who this affects
Taxonomy
Browse Categories
Get Data Privacy & Cybersecurity alerts
Weekly digest. AI-summarized, no noise.
Free. Unsubscribe anytime.
Get alerts for this source
We'll email you when CERT-Bund Security Advisories publishes new changes.