Description
An attacker who has the privilege to configure Zabbix items can use function icmpping() with additional malicious command inside it to execute arbitrary code on the current Zabbix server.
Published: 2023-12-18
Score: 6.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-3909-1 zabbix security update
EUVD EUVD EUVD-2023-36954 An attacker who has the privilege to configure Zabbix items can use function icmpping() with additional malicious command inside it to execute arbitrary code on the current Zabbix server.
History

Mon, 03 Nov 2025 22:30:00 +0000

Type Values Removed Values Added
References

Wed, 07 May 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Subscriptions

Zabbix Zabbix Server
cve-icon MITRE

Status: PUBLISHED

Assigner: Zabbix

Published:

Updated: 2025-11-03T21:48:41.788Z

Reserved: 2023-05-11T21:25:43.368Z

Link: CVE-2023-32727

cve-icon Vulnrichment

Updated: 2025-11-03T21:48:41.788Z

cve-icon NVD

Status : Modified

Published: 2023-12-18T10:15:06.937

Modified: 2025-11-03T22:16:22.293

Link: CVE-2023-32727

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses