Zabbix server is vulnerable to a DoS vulnerability due to uncontrolled resource exhaustion. An attacker can send specially crafted requests to the server, which will cause the server to allocate an excessive amount of memory and perform CPU-intensive decompression operations, ultimately leading to a service crash.
References
| Link | Resource |
|---|---|
| https://support.zabbix.com/browse/ZBX-26253 | Vendor Advisory |
| https://lists.debian.org/debian-lts-announce/2025/04/msg00027.html |
Configurations
Configuration 1 (hide)
|
History
03 Nov 2025, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
08 Oct 2025, 14:51
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
| First Time |
Zabbix
Zabbix zabbix |
|
| Summary |
|
|
| References | () https://support.zabbix.com/browse/ZBX-26253 - Vendor Advisory |
02 Apr 2025, 07:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-04-02 07:15
Updated : 2025-11-03 20:16
NVD link : CVE-2024-45700
Mitre link : CVE-2024-45700
CVE.ORG link : CVE-2024-45700
JSON object : View
Products Affected
zabbix
- zabbix
CWE
CWE-770
Allocation of Resources Without Limits or Throttling
