The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2022-23134

CVE-2022-23134: Zabbix Authentication Bypass Vulnerability

CVE-2022-23134 is an authentication bypass flaw in Zabbix that allows unauthenticated users to access setup.php steps and modify frontend configuration. This article covers technical details, affected versions, and remediation.

Published: February 18, 2026

CVE-2022-23134 Overview

CVE-2022-23134 is an authentication bypass vulnerability affecting Zabbix Frontend, a popular open-source network monitoring solution. After the initial setup process completes, certain steps of the setup.php file remain accessible to unauthenticated users rather than being restricted to super-administrators only. This improper access control allows malicious actors to bypass step checks and potentially modify the configuration of Zabbix Frontend without authentication.

Critical Impact

This vulnerability is listed in CISA's Known Exploited Vulnerabilities (KEV) catalog, indicating active exploitation in the wild. Unauthenticated attackers can modify Zabbix Frontend configuration, potentially leading to complete compromise of monitoring infrastructure.

Affected Products

  • Zabbix Zabbix (multiple versions including 5.x and 6.0.0 alpha/beta releases)
  • Fedora 34 and 35 (via packaged Zabbix)
  • Debian Linux 9.0 (via packaged Zabbix)

Discovery Timeline

  • 2022-01-13 - CVE-2022-23134 published to NVD
  • 2025-10-30 - Last updated in NVD database

Technical Details for CVE-2022-23134

Vulnerability Analysis

This vulnerability stems from improper access control (CWE-284) and improper authentication (CWE-287) within the Zabbix Frontend web application. The setup.php file, which is designed to handle initial Zabbix configuration, fails to properly enforce authentication checks after the setup process has been completed.

Under normal circumstances, the setup wizard should only be accessible during initial installation or by authenticated super-administrators for reconfiguration purposes. However, due to flawed step validation logic, unauthenticated users can directly access specific setup steps by manipulating request parameters, effectively bypassing the intended access restrictions.

The vulnerability allows attackers to reach configuration pages that should be protected, enabling them to modify database connection settings, change authentication parameters, or alter other critical configuration values that could lead to further system compromise.

Root Cause

The root cause lies in insufficient authorization checks within the setup.php file. The application fails to verify that users accessing setup steps are properly authenticated as super-administrators. The step-based navigation logic can be circumvented, allowing attackers to skip authentication requirements and directly access sensitive configuration functions.

Attack Vector

This vulnerability is exploitable over the network without requiring authentication or user interaction. An attacker with network access to a Zabbix Frontend instance can:

  1. Directly access the setup.php endpoint on the target Zabbix server
  2. Manipulate step parameters to bypass sequential validation checks
  3. Access configuration steps that should require super-administrator privileges
  4. Modify Zabbix Frontend configuration settings, potentially pointing the application to an attacker-controlled database or altering security settings

The attack requires no special privileges and can be executed remotely against any exposed Zabbix Frontend installation running a vulnerable version.

Detection Methods for CVE-2022-23134

Indicators of Compromise

  • Unexpected HTTP requests to /setup.php from external or unauthorized IP addresses
  • Configuration changes in Zabbix without corresponding administrative activity logs
  • Modified database connection settings or authentication parameters
  • Anomalous access patterns targeting Zabbix setup endpoints outside of maintenance windows

Detection Strategies

  • Monitor web server access logs for requests to setup.php that do not originate from administrative sessions
  • Implement file integrity monitoring on Zabbix configuration files to detect unauthorized changes
  • Configure alerts for any access to setup-related endpoints after initial deployment
  • Deploy web application firewalls (WAF) with rules to block unauthenticated access to sensitive endpoints

Monitoring Recommendations

  • Enable detailed logging for all Zabbix Frontend access, particularly to administrative and setup endpoints
  • Implement network-level monitoring to detect scanning activity targeting Zabbix installations
  • Configure SIEM rules to correlate Zabbix access logs with authentication events
  • Regularly audit Zabbix configuration integrity against known-good baselines

How to Mitigate CVE-2022-23134

Immediate Actions Required

  • Update Zabbix to the latest patched version immediately, as this vulnerability is actively exploited
  • Restrict network access to Zabbix Frontend using firewall rules to limit exposure
  • Remove or rename the setup.php file if the initial setup has been completed and reconfiguration is not needed
  • Review Zabbix configuration for any unauthorized changes and restore from known-good backups if necessary

Patch Information

Zabbix has released security patches addressing this vulnerability. Administrators should consult the Zabbix Issue Tracking system for specific version information and upgrade instructions. Additionally, security updates are available through distribution package managers for Fedora (see Fedora Package Announcement) and Debian (see Debian LTS Announcement).

Workarounds

  • Implement web server access controls to restrict setup.php to trusted IP addresses only
  • Use .htaccess or equivalent web server configuration to require authentication for setup.php
  • Place Zabbix Frontend behind a reverse proxy with additional authentication requirements
  • Remove or rename setup.php after completing initial configuration
bash
# Configuration example - Restrict access to setup.php in Apache
<Files "setup.php">
    Require ip 10.0.0.0/8
    Require ip 192.168.0.0/16
</Files>

# Alternative: Rename setup.php to prevent unauthenticated access
mv /usr/share/zabbix/setup.php /usr/share/zabbix/setup.php.disabled

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeAuth Bypass

  • Vendor/TechZabbix

  • SeverityMEDIUM

  • CVSS Score5.3

  • EPSS Probability93.10%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CISA KEV Information
  • In CISA KEVYes
  • CWE References
  • CWE-284

  • CWE-287
  • Technical References
  • Debian LTS Announcement

  • Fedora Package Announcement

  • Fedora Package Announcement

  • CISA Known Exploited Vulnerability
  • Vendor Resources
  • Zabbix Issue Tracking
  • Related CVEs
  • CVE-2026-23925: Zabbix Auth Bypass Vulnerability

  • CVE-2022-43515: Zabbix Frontend Auth Bypass Vulnerability

  • CVE-2022-23132: Zabbix Auth Bypass Vulnerability

  • CVE-2024-36467: Zabbix Auth Bypass Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English