vulnerability
Zimbra Collaboration: CVE-2022-37393: Collaboration: Improper Access Control
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:N/AC:M/Au:N/C:P/I:N/A:N) | Aug 16, 2022 | Jan 20, 2025 | Mar 25, 2026 |
Severity
4
CVSS
(AV:N/AC:M/Au:N/C:P/I:N/A:N)
Published
Aug 16, 2022
Added
Jan 20, 2025
Modified
Mar 25, 2026
Description
Zimbra's sudo configuration permits the zimbra user to execute the zmslapd binary as root with arbitrary parameters.
Solution
zimbra-collaboration-upgrade-latest
References
- CWE-284
- CVE-2022-37393
- https://attackerkb.com/topics/CVE-2022-37393
- https://attackerkb.com/topics/92AeLOE1M1/cve-2022-37393/rapid7-analysis
- https://darrenmartyn.ie/2021/10/27/zimbra-zmslapd-local-root-exploit/
- https://euvd.enisa.europa.eu/vulnerability/EUVD-2022-40027
- https://github.com/rapid7/metasploit-framework/pull/16807
- https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories
Rapid7 Labs
2026 Global Threat Landscape Report
The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.