HTTP: Zabbix Server Frontend Auth Bypass

This signature detects attempts to exploit a known vulnerability against Zabbix Frontend. A successful attack can lead to security bypass.

Extended Description

In the case of instances where the SAML SSO authentication is enabled (non-default), session data can be modified by a malicious actor, because a user login stored in the session was not verified. Malicious unauthenticated actor may exploit this issue to escalate privileges and gain admin access to Zabbix Frontend. To perform the attack, SAML authentication is required to be enabled and the actor has to know the username of Zabbix user (or use the guest account, which is disabled by default).

Affected Products

Zabbix zabbix

References

CVE: CVE-2022-23131

Short Name
HTTP:CTS:ZABBIX-SR-AUTH-BYPASS
Severity
Warning
Recommended
False
Recommended Action
None
Category
HTTP
Keywords
Auth Bypass CVE-2022-23131 Frontend Server Zabbix
Release Date
05/08/2025
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3807
False Positive
Unknown
Vendors

Zabbix

Found a potential security threat?