Cybersecurity

Zimbra Warns of Critical Zero-Day Flaw in Email Software Amid Active Exploits


July 14, 2023thnEmail Security / Vulnerability

Zimbra has warned of a critical zero-day security flaw in its email software that has been actively exploited in the wild.

“A security vulnerability in Zimbra Collaboration Suite Version 8.8.15 that has the potential to impact the confidentiality and integrity of your data has emerged,” the company said. said in an advisory.

It also says that the issue has been resolved and is expected to ship in the July patch release. Additional details about defects are currently unavailable.

For a while, it urged customers to implement manual repair to eliminate attack vectors –

  1. Take a backup of the file /opt/zimbra/jetty/webapps/zimbra/m/momoveto
  2. Edit this file and open line number 40
  3. Update parameter values ​​as:
  4. Before the update the line appeared as:

While the company doesn’t disclose details of active exploits, Google Threat Analysis Group (TAG) researcher Maddie Stone said it finds cross-site scripts (XSS) flaw that is abused in the wild as part of a targeted attack. TAG researcher Clément Lecigne has been credited with finding and reporting the bug.

UPCOMING WEBINARS

Protecting Against Insider Threats: SaaS Master Security Posture Management

Worried about insider threats? We are here to help you! Join this webinar to explore practical strategies and secrets to proactive security with SaaS Security Posture Management.

Join today

The disclosure comes as Cisco released a patch to remedy a critical flaw in its SD-WAN vManage software (CVE-2023-20214, CVSS score: 9.1) that allowed unauthenticated remote attackers to gain read permissions or limited write permissions for configurations from vManage instances Affected Cisco SD-WAN.

A successful exploit could allow an attacker to retrieve information from and send configuration information to the affected Cisco vManage instance. said. “A successful exploit could allow an attacker to retrieve information from and send configuration information to the affected Cisco vManage instance.”

The vulnerability has been addressed in versions 20.6.3.4, 20.6.4.2, 20.6.5.5, 20.9.3.2, 20.10.1.2, and 20.11.1.2. The network equipment department said it was not aware of any malicious use of the flaw.

Found this article interesting? Follow us on Twitter And LinkedIn to read more exclusive content we post.





Source link

Related Articles

Back to top button