ID CVE-2022-43516
Summary A Firewall Rule which allows all incoming TCP connections to all programs from any source and to all ports is created in Windows Firewall after Zabbix agent installation (MSI)
References
Vulnerable Configurations
  • cpe:2.3:a:zabbix:zabbix:6.2.6:rc1:*:*:*:*:*:*
    cpe:2.3:a:zabbix:zabbix:6.2.6:rc1:*:*:*:*:*:*
  • cpe:2.3:a:zabbix:zabbix:6.0.12:rc1:*:*:*:*:*:*
    cpe:2.3:a:zabbix:zabbix:6.0.12:rc1:*:*:*:*:*:*
  • cpe:2.3:a:zabbix:zabbix:6.2.0:-:*:*:*:*:*:*
    cpe:2.3:a:zabbix:zabbix:6.2.0:-:*:*:*:*:*:*
  • cpe:2.3:a:zabbix:zabbix:6.2.0:alpha1:*:*:*:*:*:*
    cpe:2.3:a:zabbix:zabbix:6.2.0:alpha1:*:*:*:*:*:*
  • cpe:2.3:a:zabbix:zabbix:6.2.0:alpha2:*:*:*:*:*:*
    cpe:2.3:a:zabbix:zabbix:6.2.0:alpha2:*:*:*:*:*:*
  • cpe:2.3:a:zabbix:zabbix:6.2.0:beta1:*:*:*:*:*:*
    cpe:2.3:a:zabbix:zabbix:6.2.0:beta1:*:*:*:*:*:*
  • cpe:2.3:a:zabbix:zabbix:6.2.0:beta2:*:*:*:*:*:*
    cpe:2.3:a:zabbix:zabbix:6.2.0:beta2:*:*:*:*:*:*
  • cpe:2.3:a:zabbix:zabbix:6.2.0:beta3:*:*:*:*:*:*
    cpe:2.3:a:zabbix:zabbix:6.2.0:beta3:*:*:*:*:*:*
  • cpe:2.3:a:zabbix:zabbix:6.2.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:zabbix:zabbix:6.2.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:zabbix:zabbix:6.2.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:zabbix:zabbix:6.2.0:rc2:*:*:*:*:*:*
  • cpe:2.3:a:zabbix:zabbix:6.2.0:rc3:*:*:*:*:*:*
    cpe:2.3:a:zabbix:zabbix:6.2.0:rc3:*:*:*:*:*:*
  • cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*
    cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*
  • cpe:2.3:a:microsoft:windows_firewall:-:*:*:*:*:*:*:*
    cpe:2.3:a:microsoft:windows_firewall:-:*:*:*:*:*:*:*
CVSS
Base: None
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
Impact
ConfidentialityIntegrityAvailability
Last major update 07-12-2022 - 17:23
Published 05-12-2022 - 20:15
Last modified 07-12-2022 - 17:23
Back to Top