{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T22:18:52.905","vulnerabilities":[{"cve":{"id":"CVE-2023-32727","sourceIdentifier":"security@zabbix.com","published":"2023-12-18T10:15:06.937","lastModified":"2025-11-03T22:16:22.293","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"An attacker who has the privilege to configure Zabbix items can use function icmpping() with additional malicious command inside it to execute arbitrary code on the current Zabbix server."},{"lang":"es","value":"Un atacante que tiene el privilegio de configurar elementos de Zabbix puede usar la función icmpping() con un comando malicioso adicional dentro para ejecutar código arbitrario en el servidor Zabbix actual."}],"metrics":{"cvssMetricV31":[{"source":"security@zabbix.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H","baseScore":6.8,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":0.9,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":7.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.9}]},"weaknesses":[{"source":"security@zabbix.com","type":"Secondary","description":[{"lang":"en","value":"CWE-20"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-20"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:zabbix:zabbix_server:*:*:*:*:*:*:*:*","versionStartIncluding":"4.0.0","versionEndIncluding":"4.0.49","matchCriteriaId":"7513ABE2-B8AD-4E25-8EE5-29F07902B696"},{"vulnerable":true,"criteria":"cpe:2.3:a:zabbix:zabbix_server:*:*:*:*:*:*:*:*","versionStartIncluding":"5.0.0","versionEndIncluding":"5.0.38","matchCriteriaId":"BBBB16D3-006C-4EBF-9C10-D25158E606DD"},{"vulnerable":true,"criteria":"cpe:2.3:a:zabbix:zabbix_server:*:*:*:*:*:*:*:*","versionStartIncluding":"6.0.0","versionEndIncluding":"6.0.22","matchCriteriaId":"C79F088A-4743-4EBC-BF6F-5B7842CB21BB"},{"vulnerable":true,"criteria":"cpe:2.3:a:zabbix:zabbix_server:*:*:*:*:*:*:*:*","versionStartIncluding":"6.4.0","versionEndIncluding":"6.4.7","matchCriteriaId":"C048503B-E983-455E-9D4F-F0FA6E0D32F5"},{"vulnerable":true,"criteria":"cpe:2.3:a:zabbix:zabbix_server:7.0.0:alpha1:*:*:*:*:*:*","matchCriteriaId":"0DC55403-7711-4719-A309-2616586ED479"},{"vulnerable":true,"criteria":"cpe:2.3:a:zabbix:zabbix_server:7.0.0:alpha2:*:*:*:*:*:*","matchCriteriaId":"1BB0DFCF-6ED3-4BA3-8B3F-D1F6D06A08DB"},{"vulnerable":true,"criteria":"cpe:2.3:a:zabbix:zabbix_server:7.0.0:alpha3:*:*:*:*:*:*","matchCriteriaId":"0B17E6DD-0DA4-4002-B2D2-C16EED6C97BA"},{"vulnerable":true,"criteria":"cpe:2.3:a:zabbix:zabbix_server:7.0.0:alpha6:*:*:*:*:*:*","matchCriteriaId":"3358B565-5049-4373-9529-2F70F2F50AEC"}]}]}],"references":[{"url":"https://support.zabbix.com/browse/ZBX-23857","source":"security@zabbix.com","tags":["Vendor Advisory"]},{"url":"https://lists.debian.org/debian-lts-announce/2024/10/msg00000.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://support.zabbix.com/browse/ZBX-23857","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}