Zabbix Agent 2 smartctl plugin does not properly sanitize smart.disk.get parameters, allowing an attacker to inject unexpected arguments into the smartctl command. In Zabbix 5.0 this allows for remote code execution.
History

Mon, 15 Sep 2025 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Zabbix
Zabbix zabbix
Zabbix zabbix-agent
Zabbix zabbix-agent2
Zabbix zabbix Agentd
Vendors & Products Zabbix
Zabbix zabbix
Zabbix zabbix-agent
Zabbix zabbix-agent2
Zabbix zabbix Agentd

Fri, 12 Sep 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 12 Sep 2025 10:45:00 +0000

Type Values Removed Values Added
Description Zabbix Agent 2 smartctl plugin does not properly sanitize smart.disk.get parameters, allowing an attacker to inject unexpected arguments into the smartctl command. In Zabbix 5.0 this allows for remote code execution.
Title Zabbix Agent 2 smartctl plugin RCE vulnerability in Zabbix 5.0.
Weaknesses CWE-78
References
Metrics cvssV4_0

{'score': 7.3, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Zabbix

Published: 2025-09-12T10:31:58.770Z

Updated: 2025-09-13T03:55:34.603Z

Reserved: 2025-02-20T11:40:38.480Z

Link: CVE-2025-27234

cve-icon Vulnrichment

Updated: 2025-09-12T15:16:50.450Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-09-12T11:15:31.390

Modified: 2025-09-15T15:21:42.937

Link: CVE-2025-27234

cve-icon Redhat

No data.