AI description
CVE-2025-27237 describes a vulnerability found in Zabbix Agent and Agent 2 when running on Windows operating systems. The flaw arises because the OpenSSL configuration file, which is used by these agents, is loaded from a directory that can be written to by users with low privileges. This insecure file permission allows a malicious actor with local access to modify the OpenSSL configuration. By injecting a Dynamic Link Library (DLL) into this configuration, an attacker can achieve local privilege escalation.
- Description
- In Zabbix Agent and Agent 2 on Windows, the OpenSSL configuration file is loaded from a path writable by low-privileged users, allowing malicious modification and potential local privilege escalation by injecting a DLL.
- Source
- security@zabbix.com
- NVD status
- Awaiting Analysis
CVSS 4.0
- Type
- Secondary
- Base score
- 7.3
- Impact score
- -
- Exploitability score
- -
- Vector string
- CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
- Severity
- HIGH
- security@zabbix.com
- CWE-427
Hype score is a measure of social media activity compared against trending CVEs from the past 12 months. Max score 100.
- Hype score
9
Used Claude Code to build a PoC for CVE-2025-27237 a Zabbix Agent LPE via OpenSSL config hijacking. No existing PoC to work from and sparse documentation, but we got there. Nothing groundbreaking, just useful. https://t.co/nYexI9ZYBX
@HackingLZ
26 Jan 2026
5189 Impressions
24 Retweets
97 Likes
25 Bookmarks
3 Replies
1 Quote
#VulnerabilityReport #CVE202527237 CVE-2025-27237: Zabbix Agent Flaw Allows Local Privilege Escalation via OpenSSL DLL Injection https://t.co/A6DId627PZ
@Komodosec
10 Nov 2025
7 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
⚠️Vulnerabilidad en Zabbix ❗CVE-2025-27237 ➡️Más info: https://t.co/8uSxjT1srP https://t.co/kCeT6mlqak
@CERTpy
7 Oct 2025
104 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-27237 affects Zabbix Agent for Windows (versions 6.0.0–6.0.40, 7.0.0–7.0.17, 7.2.0–7.2.11, 7.4.0–7.4.1). Local attackers can escalate privileges via OpenSSL config tampering. #ZabbixAgent #WindowsFlaw #OpenSSL https://t.co/aH9dkLFCDg
@TweetThreatNews
7 Oct 2025
32 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Zabbix Agent for Windows (6.0.0-7.4.1) loads OpenSSL config from a writeable path, letting low‑priv users inject a DLL and gain SYSTEM - CVE-2025-27237 (CVSS 7.3). Update to 6.0.41/7.0.18/7.2.12/7.4.2 now. https://t.co/07JZGQrBJ9 #infosec #CVE2025-27237 #Zabbix
@_UncleHacker_
7 Oct 2025
39 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
✍️Ngày hôm nay mình có nhận được thông báo về Zabbix - Một phần mềm chuyên sử dụng để giám sát hệ thống đang bị lỗ hổng trên môi trường windows,được đánh mã CVE-2025-27237. ⚠️Các phiên bản bị ảnh hưởng: Zabb
@gaogaocrypto
7 Oct 2025
536 Impressions
0 Retweets
22 Likes
0 Bookmarks
23 Replies
0 Quotes
🚨 Uma nova falha no Zabbix Agent e Agent2 para Windows pode permitir que atacantes locais obtenham privilégios de administrador (SYSTEM) e controlem completamente o sistema. 🔍 A vulnerabilidade, identificada como CVE-2025-27237, afeta versões entre 6.0.0 e 7.4.1 e está
@TechStartXYZ
6 Oct 2025
33 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Critical Zabbix Agent Flaw (CVE-2025-27237) Gives Local Attackers Root/Admin Access Read the full report on - https://t.co/wP4oCaypgZ https://t.co/2HaFWKjyNm
@cyberbivash
6 Oct 2025
4 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Zabbix Agentに権限昇格の脆弱性。CVE-2025-27237はCVSSスコア7.3で、Windows環境向け。OpenSSL構成ファイルの設置ディレクトリが低権限ユーザでも書き込み可能なため、DLLインジェクションが成立。修正版提供済み。 http
@__kokumoto
6 Oct 2025
867 Impressions
2 Retweets
4 Likes
2 Bookmarks
0 Replies
0 Quotes