Metrics
Affected Vendors & Products
No advisories yet.
Solution
Update AIX Zabbix Agent packages to their respective fixed versions.
Workaround
Make sure /home/cecuser directory is only accessible to trusted users.
| Link | Providers |
|---|---|
| https://support.zabbix.com/browse/ZBX-27283 |
|
Mon, 01 Dec 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Zabbix
Zabbix zabbix-agent |
|
| Vendors & Products |
Zabbix
Zabbix zabbix-agent |
Mon, 01 Dec 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 01 Dec 2025 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Library loading on AIX Zabbix Agent builds can be hijacked by local users with write access to the /home/cecuser directory. | |
| Title | Agent builds for AIX vulnerable to library loading hijacking | |
| Weaknesses | CWE-426 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: Zabbix
Published:
Updated: 2025-12-01T14:36:26.384Z
Reserved: 2025-06-09T12:23:32.445Z
Link: CVE-2025-49642
Updated: 2025-12-01T14:36:18.892Z
Status : Awaiting Analysis
Published: 2025-12-01T14:16:05.420
Modified: 2025-12-01T15:39:33.110
Link: CVE-2025-49642
No data.
OpenCVE Enrichment
Updated: 2025-12-01T21:27:28Z