Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-33666: n/a

0
High
VulnerabilityCVE-2024-33666cvecve-2024-33666
Published: Fri Apr 26 2024 (04/26/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-33666 is a high-severity vulnerability in Zammad versions prior to 6. 3. 0, where users with customer-level access to tickets could retrieve sensitive time accounting details via the API. This information should be restricted to agent-level users only. The vulnerability allows unauthorized access to confidential data without requiring authentication or user interaction, potentially impacting confidentiality and availability. Although no known exploits are currently reported in the wild, the CVSS score of 8. 6 indicates a serious risk. Organizations using affected Zammad versions should prioritize patching or implementing access controls to prevent unauthorized data exposure. This vulnerability primarily affects organizations relying on Zammad for ticket and customer support management, especially in countries with significant Zammad deployments. Immediate mitigation steps include restricting API access, monitoring API usage, and upgrading to Zammad 6.

AI-Powered Analysis

AILast updated: 02/26/2026, 04:32:40 UTC

Technical Analysis

CVE-2024-33666 is a vulnerability identified in the Zammad open-source helpdesk and customer support platform, affecting versions prior to 6.3.0. The flaw arises from improper access control enforcement in the API, allowing users with customer-level access to a ticket to retrieve time accounting details associated with that ticket. Time accounting data typically includes sensitive information such as logged work hours and billing-related metrics, which are intended to be accessible only by agents or internal staff. The vulnerability is classified under CWE-284 (Improper Access Control), indicating that the system fails to adequately restrict access to sensitive resources. The CVSS v3.1 base score is 8.6 (high), with vector AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L, meaning the vulnerability is remotely exploitable over the network without authentication or user interaction, and it results in high confidentiality impact, low integrity impact, and low availability impact. Although no known exploits have been reported in the wild, the ease of exploitation and the sensitivity of the exposed data make this a significant security concern. The vulnerability could lead to unauthorized disclosure of internal operational data, potentially aiding attackers in reconnaissance or enabling insider threats. The issue was publicly disclosed on April 26, 2024, and users are advised to upgrade to Zammad 6.3.0 or later, where the access control flaw has been addressed.

Potential Impact

The primary impact of CVE-2024-33666 is unauthorized disclosure of sensitive time accounting data within the Zammad ticketing system. This can compromise confidentiality by exposing internal operational metrics, such as time spent on tasks, which may reveal business processes, resource allocation, or billing information. Such exposure could facilitate social engineering, competitive intelligence gathering, or insider threats. Although the integrity and availability impacts are rated low, the confidentiality breach alone can have serious consequences, including loss of customer trust and regulatory compliance violations if sensitive data is mishandled. Organizations relying on Zammad for customer support and ticket management worldwide are at risk, particularly those handling sensitive or regulated data. The vulnerability's ease of exploitation without authentication increases the risk of automated or opportunistic attacks. While no active exploitation is currently known, the public disclosure and high CVSS score suggest that threat actors may develop exploits, increasing the urgency for mitigation.

Mitigation Recommendations

To mitigate CVE-2024-33666, organizations should: 1) Upgrade Zammad to version 6.3.0 or later as soon as it becomes available, as this version includes the fix for the improper access control issue. 2) In the interim, restrict API access by implementing network-level controls such as IP whitelisting or VPN access to limit exposure to trusted users only. 3) Review and tighten role-based access controls within Zammad to ensure customer users cannot access agent-only data fields. 4) Monitor API logs for unusual access patterns or attempts to retrieve time accounting data by unauthorized users. 5) If possible, disable or limit the API endpoints that expose ticket time accounting details until the patch is applied. 6) Educate internal teams about the sensitivity of time accounting data and the importance of promptly applying security updates. 7) Conduct regular audits of user permissions and API usage to detect and prevent privilege escalation or unauthorized data access. These steps go beyond generic advice by focusing on interim protective measures and proactive monitoring until the official patch is deployed.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-04-26T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c44b7ef31ef0b561c06

Added to database: 2/25/2026, 9:40:20 PM

Last enriched: 2/26/2026, 4:32:40 AM

Last updated: 2/26/2026, 11:08:44 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats