Zimbra RCE Bug Under Active Attack
A flaw in unpatched Zimbra email servers could allow attackers to obtain remote code execution by pushing malicious files past filters.
Administrators running Zimbra servers are being warned to update their systems with the "pax" utility by researchers, who have observed cyberattackers actively attempting to exploit a known flaw.
Zimbra is a cloud-hosted email and employee collaboration platform. The bug, being tracked as CVE-2022-41352, exists in the virus-scan process for incoming emails; it could allow malicious files to get through, ultimately leading to remote code execution (RCE).
Synacor, the development company behind Zimbra, issued an alert to users on Sept. 14, warning admins they needed to install the pax package against the vulnerability,
Now, Rapid7 researchers said in a blog post that they have observed active exploitation of the flaw in the wild, and urged administrators who haven't already, to update their systems.
Synacor added that Ubuntu users should have already had the pax package installed automatically.
"The vulnerability is due to the method (cpio) in which Zimbra’s antivirus engine (Amavis) scans inbound emails," the Rapid7 team explained in an Oct. 6 blog post. "Zimbra has provided a workaround, which is to install the pax utility and restart the Zimbra services."
About the Author
You May Also Like