Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-40816: n/a in n/a

0
Medium
VulnerabilityCVE-2022-40816cvecve-2022-40816
Published: Tue Sep 27 2022 (09/27/2022, 15:27:48 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

Zammad 5.2.1 is vulnerable to Incorrect Access Control. Zammad's asset handling mechanism has logic to ensure that customer users are not able to see personal information of other users. This logic was not effective when used through a web socket connection, so that a logged-in attacker would be able to fetch personal data of other users by querying the Zammad API. This issue is fixed in , 5.2.2.

AI-Powered Analysis

AILast updated: 07/07/2025, 14:42:05 UTC

Technical Analysis

CVE-2022-40816 is a medium-severity vulnerability affecting Zammad version 5.2.1, an open-source helpdesk and customer support platform. The vulnerability arises from incorrect access control in Zammad's asset handling mechanism. Specifically, the system is designed to prevent customer users from accessing personal information of other users. However, this protection fails when requests are made through a web socket connection. An authenticated attacker with a valid user account can exploit this flaw by querying the Zammad API over a web socket connection to retrieve personal data belonging to other users. This constitutes a breach of confidentiality, as sensitive user information can be exposed without proper authorization. The vulnerability does not affect integrity or availability, and no user interaction beyond authentication is required. The issue was addressed and fixed in Zammad version 5.2.2. The CVSS v3.1 base score is 6.5, reflecting a medium severity with the vector AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N, indicating network attack vector, low attack complexity, requiring privileges, no user interaction, unchanged scope, high confidentiality impact, and no integrity or availability impact. No known exploits are reported in the wild as of the published date. The vulnerability is classified under CWE-863 (Incorrect Authorization).

Potential Impact

For European organizations using Zammad 5.2.1 or earlier vulnerable versions, this vulnerability poses a significant risk to the confidentiality of user data managed within the helpdesk system. Since Zammad is often used to manage customer support tickets and internal communications, unauthorized access to personal information could lead to data breaches involving personally identifiable information (PII), potentially violating GDPR and other data protection regulations in Europe. The exposure of such data could result in reputational damage, regulatory fines, and loss of customer trust. Although the vulnerability requires an authenticated user, insider threats or compromised accounts could be leveraged to exploit this flaw. The lack of impact on integrity and availability limits the scope to data confidentiality, but the sensitive nature of the data involved elevates the risk. Organizations relying on Zammad for customer support should consider this vulnerability critical to address to maintain compliance and protect user privacy.

Mitigation Recommendations

1. Immediate upgrade to Zammad version 5.2.2 or later, where the vulnerability is fixed, is the most effective mitigation. 2. Restrict access to the Zammad web socket API to trusted networks and users by implementing network segmentation and firewall rules. 3. Enforce strong authentication mechanisms, including multi-factor authentication (MFA), to reduce the risk of account compromise. 4. Monitor and audit user activities and API access logs for unusual or unauthorized data access patterns, especially over web socket connections. 5. Limit user privileges to the minimum necessary, applying the principle of least privilege to reduce the impact of compromised accounts. 6. If immediate upgrade is not feasible, consider disabling or restricting web socket access temporarily until the patch can be applied. 7. Conduct a thorough review of data exposure and notify affected users if a breach is suspected, in compliance with GDPR requirements.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-09-19T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682defd5c4522896dcc016ae

Added to database: 5/21/2025, 3:23:01 PM

Last enriched: 7/7/2025, 2:42:05 PM

Last updated: 2/7/2026, 7:24:23 PM

Views: 36

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats