AA22-228A: Threat Actors Exploiting Multiple CVEs Against Zimbra Collaboration Suite

Cybersecurity
Original release date: August 16, 2022<br/><h3>Summary</h3><p class="tip-intro" style="font-size: 15px;"><b>Actions for ZCS administrators to take today to mitigate malicious cyber activity:</b><br />
• Patch all systems and prioritize patching <a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog">known exploited vulnerabilities.</a><br />
• Deploy detection signatures and hunt for indicators of compromise (IOCs).<br />
• If ZCS was compromised, remediate malicious activity.</p>

<p>The Cybersecurity and Infrastructure Security Agency (<a href="https://www.cisa.gov/">CISA</a>) and the Multi-State Information Sharing &amp; Analysis Center (<a href="https://www.cisecurity.org/ms_isac">MS-ISAC</a>) are publishing this joint Cybersecurity Advisory (CSA) in response to active exploitation of multiple Common Vulnerabilities and Exposures (CVEs) against Zimbra Collaboration Suite (ZCS), an enterprise cloud-hosted collaboration software and email platform. CVEs currently being exploited against ZCS include:&nbsp;</p>

<ul>
<li>CVE-2022-24682&nbsp;</li>
<li>CVE-2022-27924&nbsp;</li>
<li>CVE-2022-27925 chained with CVE-2022-37042&nbsp;</li>
<li>CVE-2022-30333</li>
</ul>

<p>Cyber threat actors may be targeting unpatched ZCS instances in both government and private sector networks. CISA and the MS-ISAC strongly urge users and administrators to apply the guidance in the Recommendations section of this CSA to help secure their organization’s systems against malicious cyber activity. CISA and the MS-ISAC encourage organizations who did not immediately update their ZCS instances upon patch release, or whose ZCS instances were exposed to the internet, to assume compromise and hunt for malicious activity using the third-party detection signatures in the Detection Methods section of this CSA. Organizations that detect potential compromise should apply the steps in the Incident Response section of this CSA.</p>

<p><a href="https://us-cert.cisa.gov/sites/default/files/publications/aa22-228a-threat-actors-exploiting-multiple-cves-against-zimbra.pdf">Download the PDF version of this report: pdf, 355 kb</a></p>
<h3>Technical Details</h3><h3>CVE-2022-27924</h3>

<p>CVE-2022-27924 is a high-severity vulnerability enabling an unauthenticated malicious actor to inject arbitrary memcache commands into a targeted ZCS instance and cause an overwrite of arbitrary cached entries. The actor can then steal ZCS email account credentials in cleartext form without any user interaction. With valid email account credentials in an organization not enforcing multifactor authentication (MFA), a malicious actor can use spear phishing, social engineering, and business email compromise (BEC) attacks against the compromised organization. Additionally, malicious actors could use the valid account credentials to open webshells and maintain persistent access.</p>

<p>On March 11, 2022, researchers from SonarSource announced the discovery of this ZCS vulnerability. Zimbra issued fixes for releases 8.8.15 and 9.0 on May 10, 2022. In June 2022, SonarSource publicly released proof-of-concept (POC) exploits for this vulnerability.[<a href="https://www.bleepingcomputer.com/news/security/hackers-are-actively-exploiting-password-stealing-flaw-in-zimbra/">1</a>][<a href="https://thehackernews.com/2022/08/cisa-adds-zimbra-email-vulnerability-to.html">2</a>] Based on evidence of active exploitation, CISA added this vulnerability to the <a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog">Known Exploited Vulnerabilities Catalog</a> on August 4, 2022. Due to the POC and ease of exploitation, CISA and the MS-ISAC expect to see widespread exploitation of unpatched ZCS instances in government and private networks.</p>

<h3>CVE-2022-27925 and CVE-2022-37042</h3>

<p>CVE-2022-27925 is a high severity vulnerability in ZCS releases 8.8.15 and 9.0 that have <code>mboximport</code> functionality to receive a ZIP archive and extract files from it. An authenticated user has the ability to upload arbitrary files to the system thereby leading to directory traversal.[<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27925">3</a>] On August 10, 2022, researchers from Volexity reported widespread exploitation—against over 1,000 ZCS instances—of CVE-2022-27925 in conjunction with CVE-2022-37042.[<a href="https://www.volexity.com/blog/2022/08/10/mass-exploitation-of-unauthenticated-zimbra-rce-cve-2022-27925/">4</a>] CISA added both CVEs to the <a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog">Known Exploited Vulnerabilities Catalog</a> on August 11, 2022.&nbsp;</p>

<p>CVE-2022-37042 is an authentication bypass vulnerability that affects ZCS releases 8.8.15 and 9.0. CVE-2022-37042 could allow an unauthenticated malicious actor access to a vulnerable ZCS instance. According to Zimbra, CVE-2022-37042 is found in the <code>MailboxImportServlet</code> function.[<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-37042">5</a>][<a href="https://blog.zimbra.com/2022/08/authentication-bypass-in-mailboximportservlet-vulnerability/">6</a>] Zimbra issued fixes in late July 2022.</p>

<h3>CVE-2022-30333</h3>

<p>CVE-2022-30333 is a high-severity directory traversal vulnerability in RARLAB UnRAR on Linux and UNIX allowing a malicious actor to write to files during an extract (unpack) operation. A malicious actor can exploit CVE-2022-30333 against a ZCS server by sending an email with a malicious RAR file. Upon email receipt, the ZCS server would automatically extract the RAR file to check for spam or malware.[<a href="https://www.securityweek.com/unrar-vulnerability-exploited-wild-likely-against-zimbra-servers">7</a>] Any ZCS instance with <code>unrar</code> installed is vulnerable to CVE-2022-30333.</p>

<p>Researchers from SonarSource shared details about this vulnerability in June 2022.[<a href="https://www.securityweek.com/unrar-vulnerability-exploited-wild-likely-against-zimbra-servers">8</a>] Zimbra made configuration changes to use the <code>7zip</code> program instead of <code>unrar</code>.[<a href="https://wiki.zimbra.com/wiki/Zimbra_Releases/9.0.0/P25">9</a>] CISA added CVE-2022-3033 to the <a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog">Known Exploited Vulnerabilities Catalog</a> on August 9, 2022. Based on industry reporting, a malicious cyber actor is selling a cross-site scripting (XSS) exploit kit for the ZCS vulnerability to CVE 2022 30333. A Metasploit module is also available that creates a RAR file that can be emailed to a ZCS server to exploit CVE-2022-30333.[<a href="https://packetstormsecurity.com/files/167989/Zimbra-UnRAR-Path-Traversal.html">10</a>]</p>

<h3>CVE-2022-24682</h3>

<p>CVE-2022-24682 is a medium-severity vulnerability that impacts ZCS webmail clients running releases before 8.8.15 patch 30 (update 1), which contain a cross-site scripting (XSS) vulnerability allowing malicious actors to steal session cookie files. Researchers from Volexity shared this vulnerability on February 3, 2022[11], and Zimbra issued a fix on February 4, 2022.[12] CISA added this vulnerability to the Known Exploited Vulnerabilities Catalog on February 25, 2022.&nbsp;</p>

<h3>DETECTION METHODS</h3>

<p>Note: CISA and the MS-ISAC will update this section with additional IOCs and signatures as further information becomes available.&nbsp;<br />
CISA recommends administrators, especially at organizations that did not immediately update their ZCS instances upon patch release, to hunt for malicious activity using the following third-party detection signatures:</p>

<ul>
<li>Hunt for IOCs including:
<ul>
<li>207.148.76[.]235 – a Cobalt Strike command and control (C2) domain</li>
</ul>
</li>
<li>Deploy third-party YARA rules to detect malicious activity:
<ul>
<li>See <a href="https://www.volexity.com/blog/2022/08/10/mass-exploitation-of-unauthenticated-zimbra-rce-cve-2022-27925/">Volexity’s Mass Exploitation of (Un)authenticated Zimbra RCE: CVE-2022-27925</a></li>
</ul>
</li>
</ul>
<h3>Mitigations</h3><p>CISA and the MS-ISAC recommend organizations upgrade to the latest ZCS releases as noted on <a href="https://wiki.zimbra.com/wiki/Security_Center">Zimbra Security – News &amp; Alerts</a> and <a href="https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories">Zimbra Security Advisories</a>.</p>

<p>See <a href="https://www.volexity.com/blog/2022/08/10/mass-exploitation-of-unauthenticated-zimbra-rce-cve-2022-27925/">Volexity’s Mass Exploitation of (Un)authenticated Zimbra RCE: CVE-2022-27925</a> for mitigation steps.</p>

<p>Additionally, CISA and the MS-ISAC recommend organizations apply the following best practices to reduce risk of compromise:</p>

<ul>
<li><strong>Maintain and test</strong> an incident response plan.</li>
<li><strong>Ensure your organization has a vulnerability management program</strong> in place and that it prioritizes patch management and vulnerability scanning of <a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog">known exploited vulnerabilities</a>. Note: CISA’s Cyber Hygiene Services (CyHy) are free to all state, local, tribal, and territorial (SLTT) organizations, as well as public and private sector critical infrastructure organizations: <a href="https://www.cisa.gov/cyber-hygiene-services">cisa.gov/cyber-hygiene-services</a>.&nbsp;</li>
<li><strong>Properly configure and secure</strong> internet-facing network devices.
<ul>
<li>Do not expose management interfaces to the internet.</li>
<li>Disable unused or unnecessary network ports and protocols.</li>
<li>Disable/remove unused network services and devices.</li>
</ul>
</li>
<li><strong>Adopt <a href="https://www.cisa.gov/blog/2021/09/07/no-trust-no-problem-maturing-towards-zero-trust-architectures">zero-trust principles and architecture</a></strong>, including:
<ul>
<li>Micro-segmenting networks and functions to limit or block lateral movements.</li>
<li>Enforcing phishing-resistant multifactor authentication (MFA) for all users and VPN connections.</li>
<li>Restricting access to trusted devices and users on the networks.</li>
</ul>
</li>
</ul>

<h3>INCIDENT RESPONSE</h3>

<p>If an organization’s system has been compromised by active or recently active threat actors in their environment, CISA and the MS-ISAC recommend the following initial steps:</p>

<ol>
<li><strong>Collect and review artifacts</strong>, such as running processes/services, unusual authentications, and recent network connections.</li>
<li><strong>Quarantine or take offline potentially affected hosts</strong>.</li>
<li><strong>Reimage compromised hosts</strong>.</li>
<li><strong>Provision new account credentials</strong>.</li>
<li><strong>Report the compromise</strong> to CISA via CISA’s 24/7 Operations Center (<a href="https://us-cert.cisa.govmailto:report@cisa.gov">report@cisa.gov</a> or 888-282-0870). SLTT government entities can also report to the MS-ISAC (<a href="https://us-cert.cisa.govmailto:SOC@cisecurity.org">SOC@cisecurity.org</a> or 866-787-4722).</li>
</ol>

<p>See the joint CSA from the cybersecurity authorities of Australia, Canada, New Zealand, the United Kingdom, and the United States on <a href="https://us-cert.cisa.gov/ncas/alerts/aa20-245a">Technical Approaches to Uncovering and Remediating Malicious Activity</a> for additional guidance on hunting or investigating a network, and for common mistakes in incident handling. CISA and the MS-ISAC also encourage government network administrators to see CISA’s <a href="https://cisa.gov/sites/default/files/publications/Federal_Government_Cybersecurity_Incident_and_Vulnerability_Response_Playbooks_508C.pdf">Federal Government Cybersecurity Incident and Vulnerability Response Playbooks</a>. Although tailored to federal civilian branch agencies, these playbooks provide operational procedures for planning and conducting cybersecurity incident and vulnerability response activities and detail steps for both incident and vulnerability response.&nbsp;</p>

<h3>ACKNOWLEDGEMENTS</h3>

<p>CISA and the MS-ISAC would like to thank Volexity and Secureworks for their contributions to this advisory.</p>

<h3>DISCLAIMER</h3>

<p>The information in this report is being provided “as is” for informational purposes only. CISA and the MS-ISAC do not provide any warranties of any kind regarding this information. CISA and the MS-ISAC do not endorse any commercial product or service, including any subjects of analysis. Any reference to specific commercial products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring.</p>
<h3>References</h3>
<ul> <li><a href="https://www.bleepingcomputer.com/news/security/hackers-are-actively-exploiting-password-stealing-flaw-in-zimbra/">[1] Hackers are actively exploiting password-stealing flaw in Zimbra</a></li> <li><a href="https://thehackernews.com/2022/08/cisa-adds-zimbra-email-vulnerability-to.html">[2] CISA adds Zimbra email vulnerability to its exploited vulnerabilities catalog</a></li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27925">[3] CVE-2022-27925 detail</a></li> <li><a href="https://www.volexity.com/blog/2022/08/10/mass-exploitation-of-unauthenticated-zimbra-rce-cve-2022-27925/">[4] Mass exploitation of (un)authenticated Zimbra RCE: CVE-2022-27925</a></li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-37042">[5] CVE-2022-37042 detail</a></li> <li><a href="https://blog.zimbra.com/2022/08/authentication-bypass-in-mailboximportservlet-vulnerability/">[6] Authentication bypass in MailboxImportServlet vulnerability</a></li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-30333">[7] CVE-2022-30333 detail</a></li> <li><a href="https://www.securityweek.com/unrar-vulnerability-exploited-wild-likely-against-zimbra-servers">[8] UnRAR vulnerability exploited in the wild, likely against Zimbra servers</a></li> <li><a href="https://wiki.zimbra.com/wiki/Zimbra_Releases/9.0.0/P25">[9] Zimbra Collaboration Kepler 9.0.0 patch 25 GA release</a></li> <li><a href="https://packetstormsecurity.com/files/167989/Zimbra-UnRAR-Path-Traversal.html">[10] Zimbra UnRAR path traversal</a></li> <li><a href="https://www.volexity.com/blog/2022/02/03/operation-emailthief-active-exploitation-of-zero-day-xss-vulnerability-in-zimbra/">[11] Operation EmailThief: Active exploitation of zero-day XSS vulnerability in Zimbra</a></li> <li><a href="https://blog.zimbra.com/2022/02/hotfix-available-5-feb-for-zero-day-exploit-vulnerability-in-zimbra-8-8-15/">[12] Hotfix available 5 Feb for zero-day exploit vulnerability in Zimbra 8.8.15</a></li> </ul> <h3>Revisions</h3>
<ul> <li>August 16, 2022: Initial Version</li> </ul>
<hr />
<div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p class="privacy-and-terms">This product is provided subject to this <a href="https://us-cert.cisa.gov/privacy/notification">Notification</a> and this <a href="https://www.dhs.gov/privacy-policy">Privacy &amp; Use</a> policy.</p>
</div>Original release date: August 16, 2022

Summary

Actions for ZCS administrators to take today to mitigate malicious cyber activity:
• Patch all systems and prioritize patching known exploited vulnerabilities.
• Deploy detection signatures and hunt for indicators of compromise (IOCs).
• If ZCS was compromised, remediate malicious activity.

The Cybersecurity and Infrastructure Security Agency (CISA) and the Multi-State Information Sharing & Analysis Center (MS-ISAC) are publishing this joint Cybersecurity Advisory (CSA) in response to active exploitation of multiple Common Vulnerabilities and Exposures (CVEs) against Zimbra Collaboration Suite (ZCS), an enterprise cloud-hosted collaboration software and email platform. CVEs currently being exploited against ZCS include: 

  • CVE-2022-24682 
  • CVE-2022-27924 
  • CVE-2022-27925 chained with CVE-2022-37042 
  • CVE-2022-30333

Cyber threat actors may be targeting unpatched ZCS instances in both government and private sector networks. CISA and the MS-ISAC strongly urge users and administrators to apply the guidance in the Recommendations section of this CSA to help secure their organization’s systems against malicious cyber activity. CISA and the MS-ISAC encourage organizations who did not immediately update their ZCS instances upon patch release, or whose ZCS instances were exposed to the internet, to assume compromise and hunt for malicious activity using the third-party detection signatures in the Detection Methods section of this CSA. Organizations that detect potential compromise should apply the steps in the Incident Response section of this CSA.

Download the PDF version of this report: pdf, 355 kb

Technical Details

CVE-2022-27924

CVE-2022-27924 is a high-severity vulnerability enabling an unauthenticated malicious actor to inject arbitrary memcache commands into a targeted ZCS instance and cause an overwrite of arbitrary cached entries. The actor can then steal ZCS email account credentials in cleartext form without any user interaction. With valid email account credentials in an organization not enforcing multifactor authentication (MFA), a malicious actor can use spear phishing, social engineering, and business email compromise (BEC) attacks against the compromised organization. Additionally, malicious actors could use the valid account credentials to open webshells and maintain persistent access.

On March 11, 2022, researchers from SonarSource announced the discovery of this ZCS vulnerability. Zimbra issued fixes for releases 8.8.15 and 9.0 on May 10, 2022. In June 2022, SonarSource publicly released proof-of-concept (POC) exploits for this vulnerability.[1][2] Based on evidence of active exploitation, CISA added this vulnerability to the Known Exploited Vulnerabilities Catalog on August 4, 2022. Due to the POC and ease of exploitation, CISA and the MS-ISAC expect to see widespread exploitation of unpatched ZCS instances in government and private networks.

CVE-2022-27925 and CVE-2022-37042

CVE-2022-27925 is a high severity vulnerability in ZCS releases 8.8.15 and 9.0 that have mboximport functionality to receive a ZIP archive and extract files from it. An authenticated user has the ability to upload arbitrary files to the system thereby leading to directory traversal.[3] On August 10, 2022, researchers from Volexity reported widespread exploitation—against over 1,000 ZCS instances—of CVE-2022-27925 in conjunction with CVE-2022-37042.[4] CISA added both CVEs to the Known Exploited Vulnerabilities Catalog on August 11, 2022. 

CVE-2022-37042 is an authentication bypass vulnerability that affects ZCS releases 8.8.15 and 9.0. CVE-2022-37042 could allow an unauthenticated malicious actor access to a vulnerable ZCS instance. According to Zimbra, CVE-2022-37042 is found in the MailboxImportServlet function.[5][6] Zimbra issued fixes in late July 2022.

CVE-2022-30333

CVE-2022-30333 is a high-severity directory traversal vulnerability in RARLAB UnRAR on Linux and UNIX allowing a malicious actor to write to files during an extract (unpack) operation. A malicious actor can exploit CVE-2022-30333 against a ZCS server by sending an email with a malicious RAR file. Upon email receipt, the ZCS server would automatically extract the RAR file to check for spam or malware.[7] Any ZCS instance with unrar installed is vulnerable to CVE-2022-30333.

Researchers from SonarSource shared details about this vulnerability in June 2022.[8] Zimbra made configuration changes to use the 7zip program instead of unrar.[9] CISA added CVE-2022-3033 to the Known Exploited Vulnerabilities Catalog on August 9, 2022. Based on industry reporting, a malicious cyber actor is selling a cross-site scripting (XSS) exploit kit for the ZCS vulnerability to CVE 2022 30333. A Metasploit module is also available that creates a RAR file that can be emailed to a ZCS server to exploit CVE-2022-30333.[10]

CVE-2022-24682

CVE-2022-24682 is a medium-severity vulnerability that impacts ZCS webmail clients running releases before 8.8.15 patch 30 (update 1), which contain a cross-site scripting (XSS) vulnerability allowing malicious actors to steal session cookie files. Researchers from Volexity shared this vulnerability on February 3, 2022[11], and Zimbra issued a fix on February 4, 2022.[12] CISA added this vulnerability to the Known Exploited Vulnerabilities Catalog on February 25, 2022. 

DETECTION METHODS

Note: CISA and the MS-ISAC will update this section with additional IOCs and signatures as further information becomes available. 
CISA recommends administrators, especially at organizations that did not immediately update their ZCS instances upon patch release, to hunt for malicious activity using the following third-party detection signatures:

Mitigations

CISA and the MS-ISAC recommend organizations upgrade to the latest ZCS releases as noted on Zimbra Security – News & Alerts and Zimbra Security Advisories.

See Volexity’s Mass Exploitation of (Un)authenticated Zimbra RCE: CVE-2022-27925 for mitigation steps.

Additionally, CISA and the MS-ISAC recommend organizations apply the following best practices to reduce risk of compromise:

  • Maintain and test an incident response plan.
  • Ensure your organization has a vulnerability management program in place and that it prioritizes patch management and vulnerability scanning of known exploited vulnerabilities. Note: CISA’s Cyber Hygiene Services (CyHy) are free to all state, local, tribal, and territorial (SLTT) organizations, as well as public and private sector critical infrastructure organizations: cisa.gov/cyber-hygiene-services
  • Properly configure and secure internet-facing network devices.
    • Do not expose management interfaces to the internet.
    • Disable unused or unnecessary network ports and protocols.
    • Disable/remove unused network services and devices.
  • Adopt zero-trust principles and architecture, including:
    • Micro-segmenting networks and functions to limit or block lateral movements.
    • Enforcing phishing-resistant multifactor authentication (MFA) for all users and VPN connections.
    • Restricting access to trusted devices and users on the networks.

INCIDENT RESPONSE

If an organization’s system has been compromised by active or recently active threat actors in their environment, CISA and the MS-ISAC recommend the following initial steps:

  1. Collect and review artifacts, such as running processes/services, unusual authentications, and recent network connections.
  2. Quarantine or take offline potentially affected hosts.
  3. Reimage compromised hosts.
  4. Provision new account credentials.
  5. Report the compromise to CISA via CISA’s 24/7 Operations Center (report@cisa.gov or 888-282-0870). SLTT government entities can also report to the MS-ISAC (SOC@cisecurity.org or 866-787-4722).

See the joint CSA from the cybersecurity authorities of Australia, Canada, New Zealand, the United Kingdom, and the United States on Technical Approaches to Uncovering and Remediating Malicious Activity for additional guidance on hunting or investigating a network, and for common mistakes in incident handling. CISA and the MS-ISAC also encourage government network administrators to see CISA’s Federal Government Cybersecurity Incident and Vulnerability Response Playbooks. Although tailored to federal civilian branch agencies, these playbooks provide operational procedures for planning and conducting cybersecurity incident and vulnerability response activities and detail steps for both incident and vulnerability response. 

ACKNOWLEDGEMENTS

CISA and the MS-ISAC would like to thank Volexity and Secureworks for their contributions to this advisory.

DISCLAIMER

The information in this report is being provided “as is” for informational purposes only. CISA and the MS-ISAC do not provide any warranties of any kind regarding this information. CISA and the MS-ISAC do not endorse any commercial product or service, including any subjects of analysis. Any reference to specific commercial products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring.

References

Revisions

  • August 16, 2022: Initial Version

This product is provided subject to this Notification and this Privacy & Use policy.

Originally Publishing Date August 16 2022 10:38:42
AA22-228A: Threat Actors Exploiting Multiple CVEs Against Zimbra Collaboration Suite

Scroll to Top