CVE-2025-27237
BaseFortify
Publication date: 2025-10-03
Last updated on: 2025-10-06
Assigner: Zabbix
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| zabbix | zabbix_agent | 4.0 |
| zabbix | zabbix_agent_2 | 4.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-427 | The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in Zabbix Agent and Agent 2 on Windows, where the OpenSSL configuration file is loaded from a path that low-privileged users can write to. This allows an attacker with local access to modify the configuration file maliciously, potentially injecting a DLL that leads to local privilege escalation.
How can this vulnerability impact me? :
The vulnerability can allow a local attacker with limited privileges to escalate their privileges on the affected system by modifying the OpenSSL configuration file to inject a malicious DLL. This could lead to unauthorized actions being performed with higher privileges, compromising system security.