CVE-2024-42332

The researcher is showing that due to the way the SNMP trap log is parsed, an attacker can craft an SNMP trap with additional lines of information and have forged data show in the Zabbix UI. This attack requires SNMP auth to be off and/or the attacker to know the community/auth details. The attack requires an SNMP item to be configured as text on the target host.
References
Link Resource
https://support.zabbix.com/browse/ZBX-25628 Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*

History

08 Oct 2025, 15:26

Type Values Removed Values Added
First Time Zabbix zabbix
Zabbix
CPE cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*
References () https://support.zabbix.com/browse/ZBX-25628 - () https://support.zabbix.com/browse/ZBX-25628 - Vendor Advisory
CWE CWE-116

Information

Published : 2024-11-27 12:15

Updated : 2025-10-08 15:26


NVD link : CVE-2024-42332

Mitre link : CVE-2024-42332

CVE.ORG link : CVE-2024-42332


JSON object : View

Products Affected

zabbix

  • zabbix
CWE
CWE-116

Improper Encoding or Escaping of Output