In Zabbix Agent and Agent 2 on Windows, the OpenSSL configuration file is loaded from a path writable by low-privileged users, allowing malicious modification and potential local privilege escalation by injecting a DLL.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://support.zabbix.com/browse/ZBX-27061 |
|
History
Mon, 06 Oct 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Microsoft
Microsoft windows Zabbix Zabbix zabbix Zabbix zabbix-agent Zabbix zabbix-agent2 Zabbix zabbix Agentd |
|
| Vendors & Products |
Microsoft
Microsoft windows Zabbix Zabbix zabbix Zabbix zabbix-agent Zabbix zabbix-agent2 Zabbix zabbix Agentd |
Fri, 03 Oct 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 03 Oct 2025 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In Zabbix Agent and Agent 2 on Windows, the OpenSSL configuration file is loaded from a path writable by low-privileged users, allowing malicious modification and potential local privilege escalation by injecting a DLL. | |
| Title | DLL injection in Zabbix Agent and Agent 2 via OpenSSL configuration | |
| Weaknesses | CWE-427 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: Zabbix
Published: 2025-10-03T11:28:43.076Z
Updated: 2025-10-04T03:55:24.833Z
Reserved: 2025-02-20T11:40:38.480Z
Link: CVE-2025-27237
Updated: 2025-10-03T13:52:17.795Z
Status : Awaiting Analysis
Published: 2025-10-03T12:15:43.930
Modified: 2025-10-06T14:56:47.823
Link: CVE-2025-27237
No data.