The researcher is showing that due to the way the SNMP trap log is parsed, an attacker can craft an SNMP trap with additional lines of information and have forged data show in the Zabbix UI. This attack requires SNMP auth to be off and/or the attacker to know the community/auth details. The attack requires an SNMP item to be configured as text on the target host.
History

Wed, 27 Nov 2024 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 27 Nov 2024 12:15:00 +0000

Type Values Removed Values Added
Description The researcher is showing that due to the way the SNMP trap log is parsed, an attacker can craft an SNMP trap with additional lines of information and have forged data show in the Zabbix UI. This attack requires SNMP auth to be off and/or the attacker to know the community/auth details. The attack requires an SNMP item to be configured as text on the target host.
Title New line injection in Zabbix SNMP traps
References
Metrics cvssV3_1

{'score': 3.7, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Zabbix

Published:

Updated: 2024-11-27T14:55:10.340Z

Reserved: 2024-07-30T08:27:36.132Z

Link: CVE-2024-42332

cve-icon Vulnrichment

Updated: 2024-11-27T14:55:06.395Z

cve-icon NVD

Status : Received

Published: 2024-11-27T12:15:21.240

Modified: 2024-11-27T12:15:21.240

Link: CVE-2024-42332

cve-icon Redhat

No data.