CISA warns of actively exploited Zimbra Collaboration Suite flaw
Take action: If you are using Zimbra Collaboration Suite and haven't patched it since 2019, it's time to patch it YESTERDAY! Since you can't patch then, patch now to the latest patched versions. There is an actively exploited SSRF flaw, and Zimbra is by design exposed to the internet. So don't wait for the hackers to call you.
Learn More
CISA has issued a warning about actively exploited vulnerability in Synacor's Zimbra Collaboration Suite (ZCS),
The exploited vulnerability is tracked as CVE-2019-9621, (CVSS score 7.5) - a server-side request forgery (SSRF) flaw in the ProxyServlet component of ZCS.
The SSRF vulnerability enables remote attackers to exploit the ProxyServlet component in certain versions of Zimbra Collaboration Suite and can force the server to make unauthorized requests to internal or external resources, leading to remote code execution, data exfiltration, or further compromise of the affected system.
Affected Versions
- ZCS up to and excluding 8.6.0
- ZCS from 8.7.0 up to and excluding 8.7.11
- ZCS from 8.8.0 up to and excluding 8.8.10
Updated versions:
- ZCS 8.8 - upgrade to 8.8.10 Patch 7 or 8.8.11 Patch 3
- ZCS 8.6 (unsupported) - upgrade to 8.6.0 Patch 13
Organizations should apply vendor-issued patches and mitigations for Zimbra Collaboration Suite immediately.