First published: Tue Aug 16 2022(Updated: )
Zimbra's sudo configuration permits the zimbra user to execute the zmslapd binary as root with arbitrary parameters. As part of its intended functionality, zmslapd can load a user-defined configuration file, which includes plugins in the form of .so files, which also execute as root.
Credit: cve@rapid7.con
Affected Software | Affected Version | How to fix |
---|---|---|
Zimbra Collaboration Suite | =8.7.6 | |
Zimbra Collaboration Suite | =8.7.7 | |
Zimbra Collaboration Suite | =8.7.9 | |
Zimbra Collaboration Suite | =8.7.10 | |
Zimbra Collaboration Suite | =8.7.11 | |
Zimbra Collaboration Suite | =8.7.11-p1 | |
Zimbra Collaboration Suite | =8.7.11-p10 | |
Zimbra Collaboration Suite | =8.7.11-p11 | |
Zimbra Collaboration Suite | =8.7.11-p12 | |
Zimbra Collaboration Suite | =8.7.11-p13 | |
Zimbra Collaboration Suite | =8.7.11-p14 | |
Zimbra Collaboration Suite | =8.7.11-p15 | |
Zimbra Collaboration Suite | =8.7.11-p2 | |
Zimbra Collaboration Suite | =8.7.11-p3 | |
Zimbra Collaboration Suite | =8.7.11-p4 | |
Zimbra Collaboration Suite | =8.7.11-p5 | |
Zimbra Collaboration Suite | =8.7.11-p6 | |
Zimbra Collaboration Suite | =8.7.11-p7 | |
Zimbra Collaboration Suite | =8.7.11-p8 | |
Zimbra Collaboration Suite | =8.7.11-p9 | |
Zimbra Collaboration Suite | =8.8.0-beta1 | |
Zimbra Collaboration Suite | =8.8.2 | |
Zimbra Collaboration Suite | =8.8.3 | |
Zimbra Collaboration Suite | =8.8.4 | |
Zimbra Collaboration Suite | =8.8.6 | |
Zimbra Collaboration Suite | =8.8.7 | |
Zimbra Collaboration Suite | =8.8.8 | |
Zimbra Collaboration Suite | =8.8.8-p1 | |
Zimbra Collaboration Suite | =8.8.8-p3 | |
Zimbra Collaboration Suite | =8.8.8-p4 | |
Zimbra Collaboration Suite | =8.8.8-p7 | |
Zimbra Collaboration Suite | =8.8.9 | |
Zimbra Collaboration Suite | =8.8.9-p1 | |
Zimbra Collaboration Suite | =8.8.9-p10 | |
Zimbra Collaboration Suite | =8.8.9-p3 | |
Zimbra Collaboration Suite | =8.8.10 | |
Zimbra Collaboration Suite | =8.8.10-p8 | |
Zimbra Collaboration Suite | =8.8.11 | |
Zimbra Collaboration Suite | =8.8.11-p3 | |
Zimbra Collaboration Suite | =8.8.11-p4 | |
Zimbra Collaboration Suite | =8.8.11-p5 | |
Zimbra Collaboration Suite | =8.8.12 | |
Zimbra Collaboration Suite | =8.8.12-p3 | |
Zimbra Collaboration Suite | =8.8.12-p4 | |
Zimbra Collaboration Suite | =8.8.15 | |
Zimbra Collaboration Suite | =8.8.15-p11 | |
Zimbra Collaboration Suite | =8.8.15-p26 | |
Zimbra Collaboration Suite | =8.8.15-p3 | |
Zimbra Collaboration Suite | =8.8.15-p30 | |
Zimbra Collaboration Suite | =8.8.15-p31 | |
Zimbra Collaboration Suite | =8.8.15-p32 | |
Zimbra Collaboration Suite | =8.8.15-p33 | |
Zimbra Collaboration Suite | =8.8.15-p34 | |
Zimbra Collaboration Suite | =8.8.15-p5 | |
Zimbra Collaboration Suite | =9.0.0-p0 | |
Zimbra Collaboration Suite | =9.0.0-p19 | |
Zimbra Collaboration Suite | =9.0.0-p23 | |
Zimbra Collaboration Suite | =9.0.0-p25 | |
Zimbra Collaboration Suite | =9.0.0-p26 | |
Zimbra Collaboration Suite | =9.0.0-p27 | |
Zimbra Collaboration Suite | =9.0.0-p4 | |
Zimbra Collaboration Suite | =9.0.0-p7 | |
Zimbra Collaboration Suite | =9.0.0-p7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-37393 has been rated as high severity due to the potential for privilege escalation allowing unauthorized root access.
To mitigate CVE-2022-37393, update Zimbra Collaboration to the latest version that includes patches for this vulnerability.
CVE-2022-37393 affects specific versions of Zimbra Collaboration, including 8.7.6 to 8.7.11, 8.8.0 to 8.8.15, and 9.0.0.
The primary risk with CVE-2022-37393 is that it allows an attacker to execute arbitrary commands with root privileges, compromising the entire system.
Yes, there have been reports of active exploitation of CVE-2022-37393 in the wild, increasing the urgency for patches.