Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2017-2825

In the trapper functionality of Zabbix Server 2.4.x, specifically crafted trapper packets can pass database logic checks, resulting in database writes. An attacker can set up a Man-in-the-Middle server to alter trapper requests made between an active Zabbix proxy and Server to trigger this vulnerability.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.006
EPSS Ranking 69.3%
CVSS Severity
CVSS v3 Score 7.0
CVSS v2 Score 6.8
Products affected by CVE-2017-2825
  • Zabbix » Zabbix » Version: 2.4.0
    cpe:2.3:a:zabbix:zabbix:2.4.0
  • Zabbix » Zabbix » Version: 2.4.1
    cpe:2.3:a:zabbix:zabbix:2.4.1
  • Zabbix » Zabbix » Version: 2.4.2
    cpe:2.3:a:zabbix:zabbix:2.4.2
  • Zabbix » Zabbix » Version: 2.4.3
    cpe:2.3:a:zabbix:zabbix:2.4.3
  • Zabbix » Zabbix » Version: 2.4.4
    cpe:2.3:a:zabbix:zabbix:2.4.4
  • Zabbix » Zabbix » Version: 2.4.5
    cpe:2.3:a:zabbix:zabbix:2.4.5
  • Zabbix » Zabbix » Version: 2.4.6
    cpe:2.3:a:zabbix:zabbix:2.4.6
  • Zabbix » Zabbix » Version: 2.4.7
    cpe:2.3:a:zabbix:zabbix:2.4.7
  • Zabbix » Zabbix » Version: 2.4.8
    cpe:2.3:a:zabbix:zabbix:2.4.8
  • Debian » Debian Linux » Version: 8.0
    cpe:2.3:o:debian:debian_linux:8.0
  • Debian » Debian Linux » Version: 9.0
    cpe:2.3:o:debian:debian_linux:9.0


Contact Us

Shodan ® - All rights reserved