Description Preview
Overview
CVE-2019-9621 is a security vulnerability in the Zimbra Collaboration Suite that allows for SSRF attacks through the ProxyServlet component. SSRF vulnerabilities can be particularly dangerous as they may allow attackers to interact with internal services that are not directly exposed to the internet, potentially leading to data leaks or further exploitation of the network. The vulnerability was publicly disclosed on March 13, 2019, and affects several versions of the software, necessitating prompt action from users to mitigate the risk.
Remediation
To remediate the vulnerability, users of the Zimbra Collaboration Suite should upgrade to the following patched versions:
- Upgrade to Zimbra Collaboration Suite version 8.6 patch 13 or later.
- Upgrade to Zimbra Collaboration Suite version 8.7.11 patch 10 or later.
- Upgrade to Zimbra Collaboration Suite version 8.8.10 patch 7 or later, or version 8.8.11 patch 3 or later.
It is also recommended to review and apply any additional security best practices to minimize exposure to SSRF and other vulnerabilities.
References
Early Warning
Customers using Armis Early Warning were notified about this vulnerability before it appeared in CISA's Known Exploited Vulnerabilities Catalog, enabling them to assess their exposure and act proactively. Armis offers these examples of CVEs already included in CISA KEV for potential customers. Click here to learn how to receive alerts earlier.
- Armis Alert Date
- Apr 30, 2019
- CISA KEV Date
- Jul 7, 2025
Industry ExposureMost to leastThis section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.
- Retail TradeRetail Trade: Low
- Accommodation & Food ServicesAccommodation & Food Services: Low
- Administrative, Support, Waste Management & Remediation ServicesAdministrative, Support, Waste Management & Remediation Services: Low
- Agriculture, Forestry Fishing & HuntingAgriculture, Forestry Fishing & Hunting: Low
- Arts, Entertainment & RecreationArts, Entertainment & Recreation: Low
- ConstructionConstruction: Low
- Educational ServicesEducational Services: Low
- Finance and InsuranceFinance and Insurance: Low
- Health Care & Social AssistanceHealth Care & Social Assistance: Low
- InformationInformation: Low
- Management of Companies & EnterprisesManagement of Companies & Enterprises: Low
- ManufacturingManufacturing: Low
- MiningMining: Low
- Other Services (except Public Administration)Other Services (except Public Administration): Low
- Professional, Scientific, & Technical ServicesProfessional, Scientific, & Technical Services: Low
- Public AdministrationPublic Administration: Low
- Real Estate Rental & LeasingReal Estate Rental & Leasing: Low
- Transportation & WarehousingTransportation & Warehousing: Low
- UtilitiesUtilities: Low
- Wholesale TradeWholesale Trade: Low