CVE-2026-23927
Received Received - Intake
Oracle TNS Connection String Injection in Zabbix Agent 2

Publication date: 2026-05-06

Last updated on: 2026-05-06

Assigner: Zabbix

Description
A user able to connect to Agent 2 can inject an Oracle TNS connection string via the 'service' parameter. This can lead to Agent 2 connecting to an attacker-controlled server and leaking Oracle database credentials if they are saved in a named session.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-06
Last Modified
2026-05-06
Generated
2026-05-07
AI Q&A
2026-05-06
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
oracle tns *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-522 The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability allows a user who can connect to Agent 2 to inject an Oracle TNS connection string through the 'service' parameter.

As a result, Agent 2 may connect to an attacker-controlled server and leak Oracle database credentials if those credentials are saved in a named session.


How can this vulnerability impact me? :

The vulnerability can lead to unauthorized disclosure of Oracle database credentials.

An attacker could exploit this to gain access to sensitive database information by causing Agent 2 to connect to a malicious server.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart