Zabbix Agent Flaw Allows SYSTEM Privilege Escalation
A high-severity vulnerability, CVE-2025-27237, affects Zabbix Agent and Agent2 on Windows systems, enabling local privilege escalation. The flaw stems from the agent loading its OpenSSL configuration from a directory where low-privileged users can write files. An attacker can modify this configuration to inject a malicious DLL, which is then executed with SYSTEM-level rights when the agent service restarts. This grants the attacker full control over the compromised host. Zabbix has released patches for all affected versions and recommends administrators upgrade immediately to prevent potential system takeovers.
Latest mentioned: 10-06
Earliest mentioned: 10-06