CVE-2026-23927
Received
Received - Intake
Oracle TNS Connection String Injection in Zabbix Agent 2
Publication date: 2026-05-06
Last updated on: 2026-05-06
Assigner: Zabbix
Description
Description
A user able to connect to Agent 2 can inject an Oracle TNS connection string via the 'service' parameter. This can lead to Agent 2 connecting to an attacker-controlled server and leaking Oracle database credentials if they are saved in a named session.
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| oracle | tns | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-522 | The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability allows a user who can connect to Agent 2 to inject an Oracle TNS connection string through the 'service' parameter.
As a result, Agent 2 may connect to an attacker-controlled server and leak Oracle database credentials if those credentials are saved in a named session.
How can this vulnerability impact me? :
The vulnerability can lead to unauthorized disclosure of Oracle database credentials.
An attacker could exploit this to gain access to sensitive database information by causing Agent 2 to connect to a malicious server.
Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70