logo
welcome
Ars Technica

Ars Technica

Attackers exploit critical Zimbra vulnerability using cc’d email addresses

Ars Technica
Summary
Nutrition label

74% Informative

The vulnerability resides in the Zimbra email and collaboration server used by medium and large organizations.

When an admin changes default settings to enable the postjournal service, attackers can execute commands by sending maliciously formed emails to an address hosted on the server.

The malicious emails were sent by the IP address 79.124.49[.]86 and, when successful, attempted to run a file hosted there using the tool known as curl.

The payload isn't delivered through emails directly, but rather through a direct connection to the malicious server.

VR Score

68

Informative language

63

Neutral language

50

Article tone

informal

Language

English

Language complexity

66

Offensive language

not offensive

Hate speech

not hateful

Attention-grabbing headline

not detected

Known propaganda techniques

not detected

Time-value

short-lived

Affiliate links

no affiliate links