The researcher is showing that due to the way the SNMP trap log is parsed, an attacker can craft an SNMP trap with additional lines of information and have forged data show in the Zabbix UI. This attack requires SNMP auth to be off and/or the attacker to know the community/auth details. The attack requires an SNMP item to be configured as text on the target host.
References
| Link | Resource |
|---|---|
| https://support.zabbix.com/browse/ZBX-25628 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
08 Oct 2025, 15:26
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Zabbix zabbix
Zabbix |
|
| CPE | cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:* | |
| References | () https://support.zabbix.com/browse/ZBX-25628 - Vendor Advisory | |
| CWE | CWE-116 |
Information
Published : 2024-11-27 12:15
Updated : 2025-10-08 15:26
NVD link : CVE-2024-42332
Mitre link : CVE-2024-42332
CVE.ORG link : CVE-2024-42332
JSON object : View
Products Affected
zabbix
- zabbix
CWE
CWE-116
Improper Encoding or Escaping of Output
