A vulnerability has been discovered within Zabbix front end which if configured with SAML could allow a remote unauthenticated attacker to exploit this issue in order to escalate privileges and gain admin access to Zabbix Frontend. To perform the attack, SAML authentication is required to be enabled and the actor has to know the username of Zabbix user (or use the guest account, which is disabled by default).
Affected Version
Zabbix 5.4.0 – 5.4.8, 6.0.0alpha1
Fixed Version
Zabbix 5.4.9rc2, 6.0.0beta1
Remediation
To remediate this vulnerability, apply the updates listed in the ‘Fixed Version’ section to appropriate products or if an immediate update is not possible, follow the presented below workarounds.
Workaround
Where immediate patching is not possible it is possible to remediation this issue by disabling SAML authentication. Please be aware of the side effects of disabling SAML before performing this action if you rely on SAML for authentication.
References

Proving Resilience: The Role of Regulator-Led Testing in Strengthening Market Stability.
How regulator-led testing fortifies market stability and sets a national standard Cyber threats are constantly evolving, with organizations facing sophisticated and persistent campaigns orchestrated by well-resourced…

The Evolution of EDR Bypasses: A Historical Timeline
The relationship between Endpoint Detection and Response (EDR) solutions and bypass techniques represents one of cybersecurity’s most dynamic battlegrounds. They are a representation of Cybersecurity as…

Billy Giles joins CovertSwarm as Head of Adversary Simulation for North America
CovertSwarm proudly welcomes Billy Giles as Head of Adversary Simulation for the North America region, strengthening our offensive cybersecurity capabilities and constant cyber attack subscription services.…