top of page
perceptive_background_267k.jpg

ZimaOS is a fork of CasaOS, an operating system for Zima devices and x86-64 systems with UEFI. In version 1.5.0 and prior, due to insufficient validation or res…

Published:

1 March 2026 at 23:00:00

Alert date:

2 March 2026 at 18:02:45

Source:

nvd.nist.gov

Click to open the original link from this advisory

Operating Systems, Mobile & IoT

ZimaOS, a fork of CasaOS operating system for Zima devices and x86-64 systems, contains a server-side request forgery (SSRF) vulnerability in version 1.5.0 and prior. The vulnerability stems from insufficient validation of target URLs, allowing authenticated local users to craft malicious requests targeting internal IP addresses including localhost and private network ranges. This enables attackers to interact with internal HTTP/HTTPS services that should not be accessible externally or to local users. The vulnerability poses significant security risks as it can lead to unauthorized access to internal services and potential lateral movement within the network. Currently, no patch is publicly available for this vulnerability.

Technical details

Mitigation steps:

Affected products:

ZimaOS
CasaOS

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Disclaimer: Deze website toont informatie afkomstig van externe bronnen. Perceptive aanvaardt geen verantwoordelijkheid voor de inhoud, juistheid of volledigheid van deze informatie.

bottom of page