vulnerability
Zimbra Collaboration: CVE-2022-37393: Collaboration: Improper Access Control
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:N/AC:M/Au:N/C:P/I:N/A:N) | Aug 16, 2022 | Jan 20, 2025 | Feb 6, 2026 |
Severity
4
CVSS
(AV:N/AC:M/Au:N/C:P/I:N/A:N)
Published
Aug 16, 2022
Added
Jan 20, 2025
Modified
Feb 6, 2026
Description
Zimbra's sudo configuration permits the zimbra user to execute the zmslapd binary as root with arbitrary parameters.
Solution
zimbra-collaboration-upgrade-latest
References
- CWE-284
- CVE-2022-37393
- https://attackerkb.com/topics/CVE-2022-37393
- URL-https://attackerkb.com/topics/92AeLOE1M1/cve-2022-37393/rapid7-analysis
- URL-https://darrenmartyn.ie/2021/10/27/zimbra-zmslapd-local-root-exploit/
- URL-https://github.com/rapid7/metasploit-framework/pull/16807
- URL-https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.