CVE-2022-32294
moderate-risk
Published 2022-07-11
Zimbra Collaboration Open Source 8.8.15 does not encrypt the initial-login randomly created password (from the "zmprove ca" command). It is visible in cleartext on port UDP 514 (aka the syslog port). NOTE: a third party reports that this cannot be reproduced.
Do I need to act?
~
2.2% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (1)
Affected Vendors
References (10)
Third Party Advisory
https://github.com/soheilsamanabadi/vulnerabilitys/blob/main/Zimbra%208.8.15%20z...
Third Party Advisory
https://github.com/soheilsamanabadi/vulnerabilitys/pull/1
Not Applicable
https://wiki.zimbra.com/wiki/Security_Center
Not Applicable
https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories
Third Party Advisory
https://github.com/soheilsamanabadi/vulnerabilitys/blob/main/Zimbra%208.8.15%20z...
Third Party Advisory
https://github.com/soheilsamanabadi/vulnerabilitys/pull/1
Not Applicable
https://wiki.zimbra.com/wiki/Security_Center
Not Applicable
https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories
42
/ 100
moderate-risk
Severity
32/34 · Critical
Exploitability
5/34 · Minimal
Exposure
5/34 · Minimal