The researcher is showing that due to the way the SNMP trap log is parsed, an attacker can craft an SNMP trap with additional lines of information and have forged data show in the Zabbix UI. This attack requires SNMP auth to be off and/or the attacker to know the community/auth details. The attack requires an SNMP item to be configured as text on the target host.
                
            References
                    | Link | Resource | 
|---|---|
| https://support.zabbix.com/browse/ZBX-25628 | Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    08 Oct 2025, 15:26
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://support.zabbix.com/browse/ZBX-25628 - Vendor Advisory | |
| First Time | Zabbix zabbix Zabbix | |
| CWE | CWE-116 | |
| CPE | cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:* | 
27 Nov 2024, 12:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-11-27 12:15
Updated : 2025-10-08 15:26
NVD link : CVE-2024-42332
Mitre link : CVE-2024-42332
CVE.ORG link : CVE-2024-42332
JSON object : View
Products Affected
                zabbix
- zabbix
CWE
                
                    
                        
                        CWE-116
                        
            Improper Encoding or Escaping of Output
