Metrics
Affected Vendors & Products
| Link | Providers |
|---|---|
| https://support.zabbix.com/browse/ZBX-25614 |
|
Wed, 04 Dec 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Zabbix
Zabbix zabbix |
|
| CPEs | cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Zabbix
Zabbix zabbix |
|
| Metrics |
ssvc
|
ssvc
|
Wed, 27 Nov 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 27 Nov 2024 06:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An authenticated user with API access (e.g.: user with default User role), more specifically a user with access to the user.update API endpoint is enough to be able to add themselves to any group (e.g.: Zabbix Administrators), except to groups that are disabled or having restricted GUI access. | |
| Title | Authentication privilege escalation via user groups due to missing authorization checks | |
| Weaknesses | CWE-285 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Zabbix
Published: 2024-11-27T06:16:30.381Z
Updated: 2024-12-04T14:36:54.043Z
Reserved: 2024-05-28T11:21:24.947Z
Link: CVE-2024-36467
Updated: 2024-11-27T14:58:23.765Z
Status : Analyzed
Published: 2024-11-27T07:15:09.080
Modified: 2025-10-08T16:05:59.373
Link: CVE-2024-36467
No data.