


The initial conguration is performed (see section Conguration wizard ). Kerio Connect is installed using the standard installation wizard.
Kerio connect 8.4.2 download#
CVSS v2 Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N/E:F/RL:ND/RC:C)Ī fix for this vulnerability is available for Kerio Connect as of version 9.2.3. You can download the latest release of Kerio Connect from here. These features make Kerio Connect a complex groupware enterprise solution. Kerio Connect must be installed under the user with administration rights to the system.The risk is that an attacker could insert a malicious link into an email which could trick the user into clicking a button, or a link to a web page, that takes them out of the Kerio Connect User. CVSS v3 Vector: AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:F/RL:U/RC:C The vulnerability is a risk to users that have their mailbox on Kerio Connect, are logged into Kerio Connect and are using email preview functionality.You can set the service to run automatically to help Kerio Connect's Let's Encrypt ACME client renew the certificate. Go to Configuration > Services > HTTP should have 'All addresses:80' listed. The HTTP service should be running on Port 80. When displayed in Kerio Connect client web application or desktop application the attacker can trick a user into clicking a button or link on a page other than the one they believe they are clicking. Make sure Kerio Connect is listening on Port 80. The risk is that an attacker could insert a malicious link into an email which could trick the user into clicking a button, or a link to a web page, that takes them out of the Kerio Connect User Interface.Īn attacker could send a specially crafted HTML email to a victim using Kerio Connect. Release History Kerio Connect 7.0.0 - 9.4. The vulnerability is a risk to users that have their mailbox on Kerio Connect, are logged into Kerio Connect and are using email preview functionality. This option ensures that the Kerio Connect performs the antivirus check against an always up-to-date cloud database before it downloads the database with the regular update.Note that Kerio Connect sends. The reported vulnerability is a "Clickjacking" vulnerability and is present in the email preview feature of Kerio Connect version 8 and version 9. New in Kerio Connect 8.4.2: To allow Kerio Connect to contact Sophos servers for the antivirus check, select Enable Sophos Live Protection.
