Analysis and contextual insights are available on OpenCVE Cloud.
Vendor Solution
Update the affected components to their respective fixed versions.
Vendor Workaround
Remove smartctl or use strict item key parameter validation with AllowKey/DenyKey.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-29035 | Zabbix Agent 2 smartctl plugin does not properly sanitize smart.disk.get parameters, allowing an attacker to inject unexpected arguments into the smartctl command. This can be used to leak the NTLMv2 hash from a Windows system. |
| Link | Providers |
|---|---|
| https://support.zabbix.com/browse/ZBX-26987 |
|
Mon, 15 Sep 2025 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Microsoft
Microsoft windows Zabbix Zabbix zabbix Zabbix zabbix-agent Zabbix zabbix-agent2 |
|
| Vendors & Products |
Microsoft
Microsoft windows Zabbix Zabbix zabbix Zabbix zabbix-agent Zabbix zabbix-agent2 |
Fri, 12 Sep 2025 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 12 Sep 2025 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Zabbix Agent 2 smartctl plugin does not properly sanitize smart.disk.get parameters, allowing an attacker to inject unexpected arguments into the smartctl command. This can be used to leak the NTLMv2 hash from a Windows system. | |
| Title | Zabbix Agent 2 smartctl plugin argument injection in Zabbix 6.0 and later. | |
| Weaknesses | CWE-77 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: Zabbix
Published:
Updated: 2025-09-12T11:58:28.618Z
Reserved: 2025-02-20T11:40:38.480Z
Link: CVE-2025-27233
Updated: 2025-09-12T11:58:23.631Z
Status : Deferred
Published: 2025-09-12T11:15:31.237
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-27233
No data.
OpenCVE Enrichment
Updated: 2025-09-15T10:43:58Z
EUVD