CISA adds Zimbra and Microsoft vulnerabilities to its KEV Catalog

CISA adds Zimbra and Microsoft vulnerabilities to its KEV Catalog


The Cybersecurity and Infrastructure Security Agency (CISA) has recently added two critical vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog. These vulnerabilities, affecting Microsoft Partner Center and Synacor Zimbra Collaboration Suite (ZCS), have been actively exploited, prompting CISA to urge immediate remediation. Here’s a detailed analysis of these vulnerabilities:

1. CVE-2024-49035: Microsoft Partner Center Improper Access Control Vulnerability

Nature of the Vulnerability

  • Description: CVE-2024-49035 is an improper access control vulnerability in Microsoft Partner Center. This flaw allows an attacker to escalate privileges, potentially gaining unauthorized access to sensitive information and administrative functions.
  • Severity: The vulnerability has a CVSS score of 8.7, indicating high severity.
  • Impact: Successful exploitation can lead to privilege escalation, allowing attackers to perform unauthorized actions within the Microsoft Partner Center environment.

Exploitation Details

  • Attack Vector: The vulnerability can be exploited by attackers with authenticated access to the Microsoft Partner Center. By manipulating access controls, attackers can escalate their privileges and gain control over the system.
  • Historical Context: Microsoft acknowledged that CVE-2024-49035 had been exploited in the wild, but did not reveal specific details on how it was weaponized in real-world attacks.

Mitigation Measures

  • Apply Security Updates: Microsoft released patches to address this vulnerability in November 2024. Users are strongly advised to apply these patches immediately to mitigate the risk.
  • Enhanced Access Controls: Implement robust access control mechanisms to ensure that only authorized users can perform privileged actions. Enforce multi-factor authentication (MFA) for all administrative accounts.

2. CVE-2023-34192: Synacor Zimbra Collaboration Suite (ZCS) Cross-Site Scripting (XSS) Vulnerability

Nature of the Vulnerability

  • Description: CVE-2023-34192 is a cross-site scripting (XSS) vulnerability in Synacor Zimbra Collaboration Suite (ZCS). This flaw allows a remote authenticated attacker to execute arbitrary code via a crafted script to the /h/autoSaveDraft function.
  • Severity: The vulnerability has a CVSS score of 9.0, indicating critical severity.
  • Impact: Successful exploitation can lead to arbitrary code execution, potentially granting attackers full control over compromised systems.

Exploitation Details

  • Attack Vector: The vulnerability can be exploited by remote authenticated attackers who inject malicious scripts via the /h/autoSaveDraft function. This can lead to arbitrary code execution and full system compromise.
  • Historical Context: While there are no public reports about in-the-wild abuse of CVE-2023-34192, the active exploitation of this XSS vulnerability in Zimbra ZCS 8.8.15 is a serious concern.

Mitigation Measures

  • Apply Security Updates: Synacor released patches to address this vulnerability in July 2023 with version 8.8.15 Patch 40. Users are strongly advised to apply these patches immediately to secure their environments.
  • Input Validation: Implement strict input validation to ensure that only trusted data is processed by the application, reducing the risk of XSS attacks.

Final Thoughts

CISA emphasizes the importance of timely remediation of these vulnerabilities to protect against active threats. Federal Civilian Executive Branch (FCEB) agencies are mandated to apply the necessary updates by March 18, 2025, to secure their networks. However, CISA strongly urges all organizations to prioritize the remediation of these vulnerabilities as part of their vulnerability management practices.

Comments

No comments yet. Why don’t you start the discussion?

    Leave a Reply

    This site uses Akismet to reduce spam. Learn how your comment data is processed.