Recently, a critical vulnerability affecting Zimbra’s postjournal service (CVE-2024-45519) was identified and is now disclosed on various security websites.
The good news? Postjournal service is not enabled by default and Zimbra has already patched this vulnerability. This patch was published in early September. Read the blog post here.
Patch Release: Multiple security issues related to Cross-Site Scripting (XSS) addressed and resolved
Zimbra administrators are strongly urged to ensure your system is up-to-date with the latest security updates.
Keeping Zimbra updated is crucial to protect against known vulnerabilities and maintain a secure environment.
For more information, check out Zimbra_Releases and stay informed about the latest security alerts by visiting the Zimbra Security Center and set-up RSS feed notifications.
Keeping your Zimbra system secure is as simple as regularly applying the latest patches – don’t wait to update!
No comments yet.