CVE-2025-27233
Zabbix Server vulnerability analysis and mitigation

Overview

A command injection vulnerability was discovered in Zabbix Agent 2's smartctl plugin (CVE-2025-27233). The vulnerability affects versions 6.0.0 through 6.0.39, 7.0.0 through 7.0.10, and 7.2.0 through 7.2.4, where the smart.disk.get parameters are not properly sanitized. This security flaw was disclosed on September 12, 2025, and allows attackers to inject unexpected arguments into the smartctl command (Zabbix Issue, NVD Entry).

Technical details

The vulnerability is classified as CWE-77 (Improper Neutralization of Special Elements used in a Command) and has received a CVSS v4.0 score of 5.7 (Medium) with the vector string CVSS:4.0/AV:A/AC:H/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N. The technical issue stems from insufficient parameter sanitization in the smartctl plugin's smart.disk.get functionality, which can be exploited through parameter manipulation (NVD Entry).

Impact

The primary impact of this vulnerability is the potential to leak NTLMv2 hash from affected Windows systems. This could potentially lead to unauthorized access if the leaked credentials are successfully cracked (Zabbix Issue).

Mitigation and workarounds

Fixed versions have been released: 6.0.40, 7.0.11, and 7.2.5. For systems that cannot be immediately updated, workarounds include removing smartctl or implementing strict item key parameter validation with AllowKey/DenyKey. Debian has also released security updates for affected packages (Zabbix Issue, Debian Tracker).

Community reactions

The vulnerability was responsibly disclosed through the HackerOne bug bounty platform by security researcher kelsier, demonstrating Zabbix's commitment to collaborative security improvement (Zabbix Issue).

Additional resources


SourceThis report was generated using AI

Related Zabbix Server vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-27240HIGH7.5
  • Zabbix ServerZabbix Server
  • zabbix
NoYesSep 12, 2025
CVE-2025-27237HIGH7.3
  • Zabbix ServerZabbix Server
  • cpe:2.3:a:zabbix:zabbix
NoNoOct 03, 2025
CVE-2025-49641MEDIUM5.1
  • Zabbix ServerZabbix Server
  • zabbix
NoYesOct 03, 2025
CVE-2025-27231MEDIUM4.3
  • Zabbix ServerZabbix Server
  • cpe:2.3:a:zabbix:zabbix
NoYesOct 03, 2025
CVE-2025-27236LOW2.1
  • Zabbix ServerZabbix Server
  • zabbix
NoYesOct 03, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management