CISA orders feds to patch Zimbra XSS flaw exploited in attacks
好的,我现在需要帮用户总结一篇文章,控制在100字以内。用户的要求是直接写文章描述,不需要开头语。首先,我得仔细阅读文章内容,抓住关键点。 文章主要讲的是CISA要求美国政府机构保护服务器,针对Zimbra协作套件中的一个被积极利用的漏洞。这个漏洞CVE-2025-66376是高危的,源于Classic UI中的存储型XSS问题,攻击者可以利用CSS导入指令在邮件HTML中进行攻击。CISA给了两周时间修复,并鼓励所有组织尽快打补丁。 接下来,我需要把这些信息浓缩到100字以内。重点包括:CISA的命令、漏洞名称和影响、修复时间、以及影响范围。要确保信息准确且简洁。 可能的结构是:CISA要求政府机构修复Zimbra漏洞CVE-2025-66376,该漏洞可被利用进行XSS攻击,窃取数据。给了两周时间,并建议所有组织尽快修复。 检查一下字数是否符合要求,确保没有遗漏关键点。 </think> CISA要求美国政府机构修复Zimbra协作套件中的高危漏洞CVE-2025-66376,该漏洞可通过存储型XSS攻击窃取敏感数据。机构需在4月1日前完成修复,并鼓励所有组织尽快打补丁以应对潜在威胁。 2026-3-18 20:0:21 Author: www.bleepingcomputer.com(查看原文) 阅读量:6 收藏

Email

CISA has ordered U.S. government agencies to secure their servers against an actively exploited vulnerability in the Zimbra Collaboration Suite (ZCS).

Zimbra is a very popular email and collaboration software suite used by hundreds of millions of people worldwide, including thousands of businesses and hundreds of government agencies.

Tracked as CVE-2025-66376 and patched in early November, this high-severity security flaw stems from a stored cross-site scripting (XSS) weakness in the Classic UI that remote unauthenticated attackers could exploit by abusing Cascading Style Sheets (CSS) @import directives in email HTML.

While Synacor (the company behind Zimbra) didn't share any details on the impact of a successful CVE-2025-66376 attack, it can likely be exploited to execute arbitrary JavaScript via malicious HTML-based emails, potentially allowing attackers to hijack user sessions and steal sensitive data within the compromised Zimbra environment.

CISA added it to its catalog of vulnerabilities exploited in the wild on Wednesday and gave Federal Civilian Executive Branch (FCEB) agencies two weeks to secure their servers by April 1st, as mandated by the Binding Operational Directive (BOD) 22-01 issued in November 2021.

Although BOD 22-01 applies only to federal agencies, the U.S. cybersecurity agency encouraged all organizations, including those in the private sector, to patch this actively exploited flaw as soon as possible.

"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable," CISA warned. "These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise."

Zimbra servers under attack

Zimbra security flaws are frequently targeted in attacks and have been exploited to breach thousands of vulnerable email servers worldwide in recent years.

For instance, as early as June 2022, Zimbra auth-bypass and remote code execution bugs were abused to breach more than 1,000 servers.

Starting in September 2022, hackers exploited a zero-day vulnerability in Zimbra Collaboration Suite, breaching nearly 900 servers within two months after gaining remote code execution on compromised instances.

The Russian state-backed Winter Vivern hacking group also used reflected XSS exploits to breach the Zimbra webmail portals of NATO-aligned governments and the mailboxes of government officials, military personnel, and diplomats.

More recently, threat actors exploited another Zimbra XSS vulnerability (CVE-2025-27915) in zero-day attacks to execute arbitrary JavaScript code, enabling them to set email filters that redirect messages to attacker-controlled servers.

tines

Red Report 2026: Why Ransomware Encryption Dropped 38%

Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.

Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.


文章来源: https://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-zimbra-xss-flaw-exploited-in-attacks/
如有侵权请联系:admin#unsafe.sh