• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
zimbra releases patch for actively exploited vulnerability in its collaboration

Zimbra Releases Patch for Actively Exploited Vulnerability in its Collaboration Suite

You are here: Home / General Cyber Security News / Zimbra Releases Patch for Actively Exploited Vulnerability in its Collaboration Suite
October 17, 2022

Zimbra has unveiled patches to incorporate an actively exploited security flaw in its company collaboration suite that could be leveraged to upload arbitrary files to vulnerable cases.

Tracked as CVE-2022-41352 (CVSS score: 9.8), the issue influences a element of the Zimbra suite identified as Amavis, an open up resource content material filter, and a lot more specifically, the cpio utility it works by using to scan and extract archives.

CyberSecurity

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


The flaw, in transform, is explained to be rooted in a further underlying vulnerability (CVE-2015-1197) that was initial disclosed in early 2015, which according to Flashpoint was rectified, only to be subsequently reverted in afterwards Linux distributions.

“An attacker can use cpio bundle to acquire incorrect obtain to any other consumer accounts,” Zimbra explained in an advisory revealed very last week, adding it “recommends pax above cpio.”

Fixes are available in the pursuing versions –

  • Zimbra 9.. Patch 27
  • Zimbra 8.8.15 Patch 34

All an adversary trying to find wants to do to weaponize the shortcoming is to send an email with a specially crafted TAR archive attachment that, on remaining been given, will get submitted to Amavis, which takes advantage of the cpio module to trigger the exploit.

Cybersecurity enterprise Kaspersky has disclosed that mysterious APT teams have actively been taking benefit of the flaw in the wild, with one particular of the actors “systematically infecting all susceptible servers in Central Asia.”

CyberSecurity

The attacks, which unfolded in excess of two attack waves in early and late September, principally specific authorities entities in the location, abusing the preliminary foothold to drop web shells on the compromised servers for stick to-on activities.

Based on information and facts shared by incident reaction firm Volexity, about 1,600 Zimbra servers are believed to have been infected in what it calls a “blend of targeted and opportunistic attacks.”

“Some web shell paths […] were being used in qualified (possible APT) exploitation of critical organizations in government, telecommunications, and IT, predominantly in Asia some others had been utilised in massive around the globe exploitation,” the company mentioned in a series of tweets.

Identified this posting interesting? Abide by THN on Fb, Twitter  and LinkedIn to examine extra exceptional content material we put up.


Some sections of this article are sourced from:
thehackernews.com

Previous Post: «Cyber Security News Hackney Council Ransomware Attack Cost £12m+
Next Post: Spanish Police Bust Region’s “Biggest Narco Bank” Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.