CVE-2022-32294

** DISPUTED ** Zimbra Collaboration Open Source 8.8.15 does not encrypt the initial-login randomly created password (from the "zmprove ca" command). It is visible in cleartext on port UDP 514 (aka the syslog port). NOTE: a third party reports that this cannot be reproduced.
Configurations

Configuration 1 (hide)

cpe:2.3:a:zimbra:collaboration:8.8.15:*:*:*:open_source:*:*:*

History

21 Nov 2024, 07:06

Type Values Removed Values Added
References () https://github.com/soheilsamanabadi/vulnerabilitys/blob/main/Zimbra%208.8.15%20zmprove%20ca%20command - Third Party Advisory () https://github.com/soheilsamanabadi/vulnerabilitys/blob/main/Zimbra%208.8.15%20zmprove%20ca%20command - Third Party Advisory
References () https://github.com/soheilsamanabadi/vulnerabilitys/pull/1 - Third Party Advisory () https://github.com/soheilsamanabadi/vulnerabilitys/pull/1 - Third Party Advisory
References () https://medium.com/%40soheil.samanabadi/zimbra-8-8-15-zmprove-ca-command-incorrect-access-control-8088032638e - () https://medium.com/%40soheil.samanabadi/zimbra-8-8-15-zmprove-ca-command-incorrect-access-control-8088032638e -
References () https://wiki.zimbra.com/wiki/Security_Center - Not Applicable, Vendor Advisory () https://wiki.zimbra.com/wiki/Security_Center - Not Applicable, Vendor Advisory
References () https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories - Not Applicable, Vendor Advisory () https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories - Not Applicable, Vendor Advisory

28 Mar 2023, 16:56

Type Values Removed Values Added
References
  • (MISC) https://github.com/soheilsamanabadi/vulnerabilitys/pull/1 - Third Party Advisory
Summary Zimbra Collaboration Open Source 8.8.15 does not encrypt the initial-login randomly created password (from the "zmprove ca" command). It is visible in cleartext on port UDP 514 (aka the syslog port). ** DISPUTED ** Zimbra Collaboration Open Source 8.8.15 does not encrypt the initial-login randomly created password (from the "zmprove ca" command). It is visible in cleartext on port UDP 514 (aka the syslog port). NOTE: a third party reports that this cannot be reproduced.

15 Jul 2022, 18:26

Type Values Removed Values Added
CPE cpe:2.3:a:zimbra:collaboration:8.8.15:*:*:*:open_source:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 7.5
v3 : 9.8
CWE CWE-863
References (MISC) https://github.com/soheilsamanabadi/vulnerabilitys/blob/main/Zimbra%208.8.15%20zmprove%20ca%20command - (MISC) https://github.com/soheilsamanabadi/vulnerabilitys/blob/main/Zimbra%208.8.15%20zmprove%20ca%20command - Third Party Advisory
References (MISC) https://wiki.zimbra.com/wiki/Security_Center - (MISC) https://wiki.zimbra.com/wiki/Security_Center - Not Applicable, Vendor Advisory
References (MISC) https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories - (MISC) https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories - Not Applicable, Vendor Advisory
References (MISC) https://medium.com/@soheil.samanabadi/zimbra-8-8-15-zmprove-ca-command-incorrect-access-control-8088032638e - (MISC) https://medium.com/@soheil.samanabadi/zimbra-8-8-15-zmprove-ca-command-incorrect-access-control-8088032638e - Exploit, Third Party Advisory

11 Jul 2022, 03:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-07-11 03:15

Updated : 2024-11-21 07:06


NVD link : CVE-2022-32294

Mitre link : CVE-2022-32294

CVE.ORG link : CVE-2022-32294


JSON object : View

Products Affected

zimbra

  • collaboration
CWE
CWE-863

Incorrect Authorization