Vulnerabilites related to Zoom - Zoom
cve-2023-39205
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Video Communications, Inc. | Zoom Clients |
Version: see references |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:02:06.477Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39205", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-29T15:18:14.262007Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-29T15:20:19.803Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows", "MacOS", "Linux", "iOS", "Android" ], "product": "Zoom Clients", "vendor": "Zoom Video Communications, Inc.", "versions": [ { "status": "affected", "version": "see references" } ] } ], "datePublic": "2023-11-14T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper conditions check in Zoom Team Chat for Zoom clients may allow an authenticated user to conduct a denial of service via network access." } ], "value": "Improper conditions check in Zoom Team Chat for Zoom clients may allow an authenticated user to conduct a denial of service via network access." } ], "impacts": [ { "capecId": "CAPEC-26", "descriptions": [ { "lang": "en", "value": "CAPEC-26 Leveraging Race Conditions" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-754", "description": "CWE-754 Improper Check for Unusual or Exceptional Conditions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-14T22:32:18.711Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2023-39205", "datePublished": "2023-11-14T22:32:18.711Z", "dateReserved": "2023-07-25T18:37:58.424Z", "dateUpdated": "2024-08-29T15:20:19.803Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-28601
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Video Communications, Inc. | Zoom for Windows Client |
Version: before 5.14.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T13:43:22.959Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-28601", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-01-02T20:00:42.831156Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-02T20:01:16.684Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Zoom for Windows Client", "vendor": "Zoom Video Communications, Inc.", "versions": [ { "status": "affected", "version": "before 5.14.0" } ] } ], "datePublic": "2023-06-13T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Zoom for Windows clients prior to 5.14.0 contain an improper restriction of operations within the bounds of a memory buffer vulnerability. A malicious user may alter protected Zoom Client memory buffer potentially causing integrity issues within the Zoom Client." } ], "value": "Zoom for Windows clients prior to 5.14.0 contain an improper restriction of operations within the bounds of a memory buffer vulnerability. A malicious user may alter protected Zoom Client memory buffer potentially causing integrity issues within the Zoom Client." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-358", "description": "CWE-358: Improperly Implemented Security Check for Standard", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-19T19:22:30.273Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2023-28601", "datePublished": "2023-06-13T17:05:58.289Z", "dateReserved": "2023-03-17T13:27:32.368Z", "dateUpdated": "2025-01-02T20:01:16.684Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-6110
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1056 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T08:47:41.068Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1056" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Zoom", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Zoom Client Application 4.6.10 Zoom Client Application 4.6.11" } ] } ], "descriptions": [ { "lang": "en", "value": "An exploitable partial path traversal vulnerability exists in the way Zoom Client version 4.6.10 processes messages including shared code snippets. A specially crafted chat message can cause an arbitrary binary planting which could be abused to achieve arbitrary code execution. An attacker needs to send a specially crafted message to a target user or a group to trigger this vulnerability. For the most severe effect, target user interaction is required." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-19T15:16:07", "orgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b", "shortName": "talos" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1056" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "talos-cna@cisco.com", "ID": "CVE-2020-6110", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Zoom", "version": { "version_data": [ { "version_value": "Zoom Client Application 4.6.10 Zoom Client Application 4.6.11" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An exploitable partial path traversal vulnerability exists in the way Zoom Client version 4.6.10 processes messages including shared code snippets. A specially crafted chat message can cause an arbitrary binary planting which could be abused to achieve arbitrary code execution. An attacker needs to send a specially crafted message to a target user or a group to trigger this vulnerability. For the most severe effect, target user interaction is required." } ] }, "impact": { "cvss": { "baseScore": 8, "baseSeverity": "High", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1056", "refsource": "MISC", "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1056" } ] } } } }, "cveMetadata": { "assignerOrgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b", "assignerShortName": "talos", "cveId": "CVE-2020-6110", "datePublished": "2020-06-08T13:22:34", "dateReserved": "2020-01-07T00:00:00", "dateUpdated": "2024-08-04T08:47:41.068Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-13450
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://medium.com/%40jonathan.leitschuh/zoom-zero-day-4-million-webcams-maybe-an-rce-just-get-them-to-visit-your-website-ac75c83f4ef5 | x_refsource_MISC | |
https://assets.zoom.us/docs/pdf/Zoom+Response+Video-On+Vulnerability.pdf | x_refsource_MISC | |
https://news.ycombinator.com/item?id=20387298 | x_refsource_MISC | |
https://blog.zoom.us/wordpress/2019/07/08/response-to-video-on-concern/ | x_refsource_MISC | |
https://twitter.com/moreati/status/1148548799813640193 | x_refsource_MISC | |
http://www.securityfocus.com/bid/109082 | vdb-entry, x_refsource_BID | |
https://twitter.com/zoom_us/status/1148710712241295361 | x_refsource_MISC | |
https://bugs.chromium.org/p/chromium/issues/detail?id=951540 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T23:49:25.076Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://medium.com/%40jonathan.leitschuh/zoom-zero-day-4-million-webcams-maybe-an-rce-just-get-them-to-visit-your-website-ac75c83f4ef5" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://assets.zoom.us/docs/pdf/Zoom+Response+Video-On+Vulnerability.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://news.ycombinator.com/item?id=20387298" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://blog.zoom.us/wordpress/2019/07/08/response-to-video-on-concern/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://twitter.com/moreati/status/1148548799813640193" }, { "name": "109082", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/109082" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://twitter.com/zoom_us/status/1148710712241295361" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugs.chromium.org/p/chromium/issues/detail?id=951540" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Zoom Client through 4.4.4 and RingCentral 7.0.136380.0312 on macOS, remote attackers can force a user to join a video call with the video camera active. This occurs because any web site can interact with the Zoom web server on localhost port 19421 or 19424. NOTE: a machine remains vulnerable if the Zoom Client was installed in the past and then uninstalled. Blocking exploitation requires additional steps, such as the ZDisableVideo preference and/or killing the web server, deleting the ~/.zoomus directory, and creating a ~/.zoomus plain file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-07-12T11:44:02", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://medium.com/%40jonathan.leitschuh/zoom-zero-day-4-million-webcams-maybe-an-rce-just-get-them-to-visit-your-website-ac75c83f4ef5" }, { "tags": [ "x_refsource_MISC" ], "url": "https://assets.zoom.us/docs/pdf/Zoom+Response+Video-On+Vulnerability.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://news.ycombinator.com/item?id=20387298" }, { "tags": [ "x_refsource_MISC" ], "url": "https://blog.zoom.us/wordpress/2019/07/08/response-to-video-on-concern/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://twitter.com/moreati/status/1148548799813640193" }, { "name": "109082", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/109082" }, { "tags": [ "x_refsource_MISC" ], "url": "https://twitter.com/zoom_us/status/1148710712241295361" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugs.chromium.org/p/chromium/issues/detail?id=951540" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-13450", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In the Zoom Client through 4.4.4 and RingCentral 7.0.136380.0312 on macOS, remote attackers can force a user to join a video call with the video camera active. This occurs because any web site can interact with the Zoom web server on localhost port 19421 or 19424. NOTE: a machine remains vulnerable if the Zoom Client was installed in the past and then uninstalled. Blocking exploitation requires additional steps, such as the ZDisableVideo preference and/or killing the web server, deleting the ~/.zoomus directory, and creating a ~/.zoomus plain file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://medium.com/@jonathan.leitschuh/zoom-zero-day-4-million-webcams-maybe-an-rce-just-get-them-to-visit-your-website-ac75c83f4ef5", "refsource": "MISC", "url": "https://medium.com/@jonathan.leitschuh/zoom-zero-day-4-million-webcams-maybe-an-rce-just-get-them-to-visit-your-website-ac75c83f4ef5" }, { "name": "https://assets.zoom.us/docs/pdf/Zoom+Response+Video-On+Vulnerability.pdf", "refsource": "MISC", "url": "https://assets.zoom.us/docs/pdf/Zoom+Response+Video-On+Vulnerability.pdf" }, { "name": "https://news.ycombinator.com/item?id=20387298", "refsource": "MISC", "url": "https://news.ycombinator.com/item?id=20387298" }, { "name": "https://blog.zoom.us/wordpress/2019/07/08/response-to-video-on-concern/", "refsource": "MISC", "url": "https://blog.zoom.us/wordpress/2019/07/08/response-to-video-on-concern/" }, { "name": "https://twitter.com/moreati/status/1148548799813640193", "refsource": "MISC", "url": "https://twitter.com/moreati/status/1148548799813640193" }, { "name": "109082", "refsource": "BID", "url": "http://www.securityfocus.com/bid/109082" }, { "name": "https://twitter.com/zoom_us/status/1148710712241295361", "refsource": "MISC", "url": "https://twitter.com/zoom_us/status/1148710712241295361" }, { "name": "https://bugs.chromium.org/p/chromium/issues/detail?id=951540", "refsource": "MISC", "url": "https://bugs.chromium.org/p/chromium/issues/detail?id=951540" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-13450", "datePublished": "2019-07-09T05:49:07", "dateReserved": "2019-07-09T00:00:00", "dateUpdated": "2024-08-04T23:49:25.076Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-24697
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Video Communications, Inc. | Zoom Clients |
Version: see references |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T23:28:11.187Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.zoom.com/en/trust/security-bulletin/ZSB-24004/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Zoom Clients", "vendor": "Zoom Video Communications, Inc.", "versions": [ { "status": "affected", "version": "see references" } ] } ], "datePublic": "2024-02-13T13:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Untrusted search path in some Zoom 32 bit Windows clients may allow an authenticated user to conduct an escalation of privilege via local access.\u003cbr\u003e" } ], "value": "Untrusted search path in some Zoom 32 bit Windows clients may allow an authenticated user to conduct an escalation of privilege via local access.\n" } ], "impacts": [ { "capecId": "CAPEC-471", "descriptions": [ { "lang": "en", "value": "CAPEC-471 Search Order Hijacking" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-426", "description": "CWE-426 Untrusted Search Path", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-13T23:53:43.589Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://www.zoom.com/en/trust/security-bulletin/ZSB-24004/" } ], "source": { "discovery": "UNKNOWN" }, "title": "Zoom Clients - Untrusted Search Path", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2024-24697", "datePublished": "2024-02-13T23:53:43.589Z", "dateReserved": "2024-01-26T22:56:14.681Z", "dateUpdated": "2024-08-01T23:28:11.187Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-15049
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://packetstormsecurity.com/files/145453/Zoom-Linux-Client-2.0.106600.0904-Command-Injection.html | x_refsource_MISC | |
https://www.exploit-db.com/exploits/43354/ | exploit, x_refsource_EXPLOIT-DB | |
https://github.com/convisoappsec/advisories/blob/master/2017/CONVISO-17-003.txt | x_refsource_MISC | |
http://seclists.org/fulldisclosure/2017/Dec/47 | mailing-list, x_refsource_FULLDISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T19:42:22.357Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/145453/Zoom-Linux-Client-2.0.106600.0904-Command-Injection.html" }, { "name": "43354", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/43354/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/convisoappsec/advisories/blob/master/2017/CONVISO-17-003.txt" }, { "name": "20171215 [CONVISO-17-003] - Zoom Linux Client Command Injection Vulnerability (RCE)", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2017/Dec/47" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-12-12T00:00:00", "descriptions": [ { "lang": "en", "value": "The ZoomLauncher binary in the Zoom client for Linux before 2.0.115900.1201 does not properly sanitize user input when constructing a shell command, which allows remote attackers to execute arbitrary code by leveraging the zoommtg:// scheme handler." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-12-20T10:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/145453/Zoom-Linux-Client-2.0.106600.0904-Command-Injection.html" }, { "name": "43354", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/43354/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/convisoappsec/advisories/blob/master/2017/CONVISO-17-003.txt" }, { "name": "20171215 [CONVISO-17-003] - Zoom Linux Client Command Injection Vulnerability (RCE)", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2017/Dec/47" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-15049", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The ZoomLauncher binary in the Zoom client for Linux before 2.0.115900.1201 does not properly sanitize user input when constructing a shell command, which allows remote attackers to execute arbitrary code by leveraging the zoommtg:// scheme handler." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://packetstormsecurity.com/files/145453/Zoom-Linux-Client-2.0.106600.0904-Command-Injection.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/145453/Zoom-Linux-Client-2.0.106600.0904-Command-Injection.html" }, { "name": "43354", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/43354/" }, { "name": "https://github.com/convisoappsec/advisories/blob/master/2017/CONVISO-17-003.txt", "refsource": "MISC", "url": "https://github.com/convisoappsec/advisories/blob/master/2017/CONVISO-17-003.txt" }, { "name": "20171215 [CONVISO-17-003] - Zoom Linux Client Command Injection Vulnerability (RCE)", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2017/Dec/47" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-15049", "datePublished": "2017-12-19T15:00:00", "dateReserved": "2017-10-05T00:00:00", "dateUpdated": "2024-08-05T19:42:22.357Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-13567
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://twitter.com/riskybusiness/status/1149125147019767814 | x_refsource_MISC | |
https://twitter.com/JLLeitschuh/status/1149420685405708295 | x_refsource_MISC | |
https://twitter.com/wcbowling/status/1149457231504498689 | x_refsource_MISC | |
https://twitter.com/JLLeitschuh/status/1149422543658520578 | x_refsource_MISC | |
https://support.zoom.us/hc/en-us/articles/201361963-New-Updates-for-Mac-OS | x_refsource_MISC | |
https://gist.github.com/wbowling/13f9f90365c171806b9ffba2c841026b | x_refsource_MISC | |
https://twitter.com/wcbowling/status/1166998107667619841 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T23:57:39.254Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://twitter.com/riskybusiness/status/1149125147019767814" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://twitter.com/JLLeitschuh/status/1149420685405708295" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://twitter.com/wcbowling/status/1149457231504498689" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://twitter.com/JLLeitschuh/status/1149422543658520578" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.zoom.us/hc/en-us/articles/201361963-New-Updates-for-Mac-OS" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gist.github.com/wbowling/13f9f90365c171806b9ffba2c841026b" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://twitter.com/wcbowling/status/1166998107667619841" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The Zoom Client before 4.4.53932.0709 on macOS allows remote code execution, a different vulnerability than CVE-2019-13450. If the ZoomOpener daemon (aka the hidden web server) is running, but the Zoom Client is not installed or can\u0027t be opened, an attacker can remotely execute code with a maliciously crafted launch URL. NOTE: ZoomOpener is removed by the Apple Malware Removal Tool (MRT) if this tool is enabled and has the 2019-07-10 MRTConfigData." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-08-30T16:11:12", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://twitter.com/riskybusiness/status/1149125147019767814" }, { "tags": [ "x_refsource_MISC" ], "url": "https://twitter.com/JLLeitschuh/status/1149420685405708295" }, { "tags": [ "x_refsource_MISC" ], "url": "https://twitter.com/wcbowling/status/1149457231504498689" }, { "tags": [ "x_refsource_MISC" ], "url": "https://twitter.com/JLLeitschuh/status/1149422543658520578" }, { "tags": [ "x_refsource_MISC" ], "url": "https://support.zoom.us/hc/en-us/articles/201361963-New-Updates-for-Mac-OS" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gist.github.com/wbowling/13f9f90365c171806b9ffba2c841026b" }, { "tags": [ "x_refsource_MISC" ], "url": "https://twitter.com/wcbowling/status/1166998107667619841" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-13567", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Zoom Client before 4.4.53932.0709 on macOS allows remote code execution, a different vulnerability than CVE-2019-13450. If the ZoomOpener daemon (aka the hidden web server) is running, but the Zoom Client is not installed or can\u0027t be opened, an attacker can remotely execute code with a maliciously crafted launch URL. NOTE: ZoomOpener is removed by the Apple Malware Removal Tool (MRT) if this tool is enabled and has the 2019-07-10 MRTConfigData." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://twitter.com/riskybusiness/status/1149125147019767814", "refsource": "MISC", "url": "https://twitter.com/riskybusiness/status/1149125147019767814" }, { "name": "https://twitter.com/JLLeitschuh/status/1149420685405708295", "refsource": "MISC", "url": "https://twitter.com/JLLeitschuh/status/1149420685405708295" }, { "name": "https://twitter.com/wcbowling/status/1149457231504498689", "refsource": "MISC", "url": "https://twitter.com/wcbowling/status/1149457231504498689" }, { "name": "https://twitter.com/JLLeitschuh/status/1149422543658520578", "refsource": "MISC", "url": "https://twitter.com/JLLeitschuh/status/1149422543658520578" }, { "name": "https://support.zoom.us/hc/en-us/articles/201361963-New-Updates-for-Mac-OS", "refsource": "MISC", "url": "https://support.zoom.us/hc/en-us/articles/201361963-New-Updates-for-Mac-OS" }, { "name": "https://gist.github.com/wbowling/13f9f90365c171806b9ffba2c841026b", "refsource": "MISC", "url": "https://gist.github.com/wbowling/13f9f90365c171806b9ffba2c841026b" }, { "name": "https://twitter.com/wcbowling/status/1166998107667619841", "refsource": "MISC", "url": "https://twitter.com/wcbowling/status/1166998107667619841" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-13567", "datePublished": "2019-07-12T03:00:51", "dateReserved": "2019-07-11T00:00:00", "dateUpdated": "2024-08-04T23:57:39.254Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-24699
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Video Communications, Inc. | Zoom Clients |
Version: see references |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-24699", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-14T14:00:35.091787Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:43:37.883Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T23:28:11.153Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.zoom.com/en/trust/security-bulletin/ZSB-24006/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows", "iOS", "Linux", "Android" ], "product": "Zoom Clients", "vendor": "Zoom Video Communications, Inc.", "versions": [ { "status": "affected", "version": "see references" } ] } ], "datePublic": "2024-02-13T13:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Business logic error in some Zoom clients may allow an authenticated user to conduct information disclosure via network access.\u003cbr\u003e" } ], "value": "Business logic error in some Zoom clients may allow an authenticated user to conduct information disclosure via network access.\n" } ], "impacts": [ { "capecId": "CAPEC-441", "descriptions": [ { "lang": "en", "value": "CAPEC-441 Malicious Logic Insertion" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "description": "Business Logic Error", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-13T23:58:44.327Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://www.zoom.com/en/trust/security-bulletin/ZSB-24006/" } ], "source": { "discovery": "UNKNOWN" }, "title": "Zoom Clients - Business Logic Error", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2024-24699", "datePublished": "2024-02-13T23:58:44.327Z", "dateReserved": "2024-01-26T22:56:14.681Z", "dateUpdated": "2024-08-01T23:28:11.153Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39213
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Video Communications, Inc. | Zoom Desktop Client for Windows and Zoom VDI Client |
Version: before 5.15.2 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:02:06.849Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39213", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-10T16:19:43.040384Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-10T16:19:52.228Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Zoom Desktop Client for Windows and Zoom VDI Client", "vendor": "Zoom Video Communications, Inc.", "versions": [ { "status": "affected", "version": "before 5.15.2" } ] } ], "datePublic": "2023-08-08T15:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper neutralization of special elements in Zoom Desktop Client for Windows and Zoom VDI Client before 5.15.2 may allow an unauthenticated user to enable an escalation of privilege via network access." } ], "value": "Improper neutralization of special elements in Zoom Desktop Client for Windows and Zoom VDI Client before 5.15.2 may allow an unauthenticated user to enable an escalation of privilege via network access." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.6, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-176", "description": "CWE-176: Improper Handling of Unicode Encoding", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-27T19:05:47.094Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2023-39213", "datePublished": "2023-08-08T21:36:13.783Z", "dateReserved": "2023-07-25T18:38:00.938Z", "dateUpdated": "2024-10-10T16:19:52.228Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39203
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Video Communications, Inc. | Zoom Rooms Client for Windows and Zoom VDI Client |
Version: see references |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:02:06.433Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39203", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-14T18:52:24.335865Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-14T19:17:07.852Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Zoom Rooms Client for Windows and Zoom VDI Client", "vendor": "Zoom Video Communications, Inc.", "versions": [ { "status": "affected", "version": "see references" } ] } ], "datePublic": "2023-11-14T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Uncontrolled resource consumption in Zoom Team Chat for Zoom Desktop Client for Windows and Zoom VDI Client may allow an unauthenticated user to conduct a disclosure of information via network access." } ], "value": "Uncontrolled resource consumption in Zoom Team Chat for Zoom Desktop Client for Windows and Zoom VDI Client may allow an unauthenticated user to conduct a disclosure of information via network access." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-789", "description": "CWE-789: Memory Allocation with Excessive Size Value", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-27T18:59:21.922Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2023-39203", "datePublished": "2023-11-14T22:23:00.825Z", "dateReserved": "2023-07-25T18:37:58.424Z", "dateUpdated": "2024-09-27T18:59:21.922Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39216
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Video Communications, Inc. | Zoom Desktop Client for Windows |
Version: before 5.14.7 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:02:06.395Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39216", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-10T16:22:05.535860Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-10T16:22:15.094Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Zoom Desktop Client for Windows", "vendor": "Zoom Video Communications, Inc.", "versions": [ { "status": "affected", "version": "before 5.14.7" } ] } ], "datePublic": "2023-08-08T15:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper input validation in Zoom Desktop Client for Windows before 5.14.7 may allow an unauthenticated user to enable an escalation of privilege via network access." } ], "value": "Improper input validation in Zoom Desktop Client for Windows before 5.14.7 may allow an unauthenticated user to enable an escalation of privilege via network access." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.6, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-80", "description": "CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-27T19:11:10.571Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2023-39216", "datePublished": "2023-08-08T17:48:05.348Z", "dateReserved": "2023-07-25T18:38:00.939Z", "dateUpdated": "2024-10-10T16:22:15.094Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-15715
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.tenable.com/security/research/tra-2018-40 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T10:01:54.650Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.tenable.com/security/research/tra-2018-40" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Zoom", "vendor": "Zoom", "versions": [ { "status": "affected", "version": "Zoom on Windows before version 4.1.34814.1119, Zoom on Mac OS before version 4.1.34801.1116, Zoom on Linux version 2.4.129780.0915 and below." } ] } ], "datePublic": "2018-11-29T00:00:00", "descriptions": [ { "lang": "en", "value": "Zoom clients on Windows (before version 4.1.34814.1119), Mac OS (before version 4.1.34801.1116), and Linux (2.4.129780.0915 and below) are vulnerable to unauthorized message processing. A remote unauthenticated attacker can spoof UDP messages from a meeting attendee or Zoom server in order to invoke functionality in the target client. This allows the attacker to remove attendees from meetings, spoof messages from users, or hijack shared screens." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-290", "description": "CWE-290 Authentication Bypass by Spoofing", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-11-30T19:57:01", "orgId": "5ac1ecc2-367a-4d16-a0b2-35d495ddd0be", "shortName": "tenable" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.tenable.com/security/research/tra-2018-40" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vulnreport@tenable.com", "DATE_PUBLIC": "2018-11-29T00:00:00", "ID": "CVE-2018-15715", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Zoom", "version": { "version_data": [ { "version_value": "Zoom on Windows before version 4.1.34814.1119, Zoom on Mac OS before version 4.1.34801.1116, Zoom on Linux version 2.4.129780.0915 and below." } ] } } ] }, "vendor_name": "Zoom" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Zoom clients on Windows (before version 4.1.34814.1119), Mac OS (before version 4.1.34801.1116), and Linux (2.4.129780.0915 and below) are vulnerable to unauthorized message processing. A remote unauthenticated attacker can spoof UDP messages from a meeting attendee or Zoom server in order to invoke functionality in the target client. This allows the attacker to remove attendees from meetings, spoof messages from users, or hijack shared screens." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-290 Authentication Bypass by Spoofing" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.tenable.com/security/research/tra-2018-40", "refsource": "MISC", "url": "https://www.tenable.com/security/research/tra-2018-40" } ] } } } }, "cveMetadata": { "assignerOrgId": "5ac1ecc2-367a-4d16-a0b2-35d495ddd0be", "assignerShortName": "tenable", "cveId": "CVE-2018-15715", "datePublished": "2018-11-30T20:00:00Z", "dateReserved": "2018-08-22T00:00:00", "dateUpdated": "2024-09-16T21:56:33.284Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-28598
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Video Communications, Inc. | Zoom for Linux clients |
Version: before 5.13.10 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T13:43:22.564Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-28598", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-02T20:02:53.554709Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-02T20:03:12.036Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Zoom for Linux clients", "vendor": "Zoom Video Communications, Inc.", "versions": [ { "status": "affected", "version": "before 5.13.10" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Zoom for Linux clients prior to 5.13.10 contain an HTML injection vulnerability. If a victim starts a chat with a malicious user it could result in a Zoom application crash." } ], "value": "Zoom for Linux clients prior to 5.13.10 contain an HTML injection vulnerability. If a victim starts a chat with a malicious user it could result in a Zoom application crash." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-19T13:39:44.623Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2023-28598", "datePublished": "2023-06-13T16:49:29.971Z", "dateReserved": "2023-03-17T13:27:32.368Z", "dateUpdated": "2025-01-02T20:03:12.036Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-49646
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Video Communications, Inc. | Zoom Clients |
Version: See references |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:01:25.386Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.zoom.com/en/trust/security-bulletin/ZSB-23062/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows", "MacOS", "Linux", "iOS", "Android" ], "product": "Zoom Clients", "vendor": "Zoom Video Communications, Inc.", "versions": [ { "status": "affected", "version": "See references" } ] } ], "datePublic": "2023-12-12T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper authentication in some Zoom clients before version 5.16.5 may allow an authenticated user to conduct a denial of service via network access." } ], "value": "Improper authentication in some Zoom clients before version 5.16.5 may allow an authenticated user to conduct a denial of service via network access." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-347", "description": "CWE-347 Improper Verification of Cryptographic Signature", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-20T14:53:41.733Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://www.zoom.com/en/trust/security-bulletin/ZSB-23062/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2023-49646", "datePublished": "2023-12-13T22:19:26.963Z", "dateReserved": "2023-11-28T18:18:33.930Z", "dateUpdated": "2024-09-20T14:53:41.733Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-28600
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Video Communications, Inc. | Zoom for macOS Client |
Version: before 5.14.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T13:43:23.226Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-28600", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-02T20:01:37.162238Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-02T20:01:49.568Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Zoom for macOS Client", "vendor": "Zoom Video Communications, Inc.", "versions": [ { "status": "affected", "version": "before 5.14.0" } ] } ], "datePublic": "2023-06-13T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Zoom for MacOSclients prior to 5.14.0 contain an improper access control vulnerability. A malicious user may be able to delete/replace Zoom Client files potentially causing a loss of integrity and availability to the Zoom Client.\u003cbr\u003e\u003cbr\u003e" } ], "value": "Zoom for MacOSclients prior to 5.14.0 contain an improper access control vulnerability. A malicious user may be able to delete/replace Zoom Client files potentially causing a loss of integrity and availability to the Zoom Client." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-378", "description": "CWE-378: Creation of Temporary File With Insecure Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-19T19:21:20.793Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2023-28600", "datePublished": "2023-06-13T17:00:53.178Z", "dateReserved": "2023-03-17T13:27:32.368Z", "dateUpdated": "2025-01-02T20:01:49.568Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39211
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Video Communications, Inc. | Zoom Desktop Client for Windows and Zoom Rooms for Windows |
Version: before 5.15.5 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:02:05.177Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39211", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-10T16:20:08.759908Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-10T16:20:17.820Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Zoom Desktop Client for Windows and Zoom Rooms for Windows", "vendor": "Zoom Video Communications, Inc.", "versions": [ { "status": "affected", "version": "before 5.15.5" } ] } ], "datePublic": "2023-08-08T15:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper privilege management in Zoom Desktop Client for Windows and Zoom Rooms for Windows before 5.15.5 may allow an authenticated user to enable an information disclosure via local access." } ], "value": "Improper privilege management in Zoom Desktop Client for Windows and Zoom Rooms for Windows before 5.15.5 may allow an authenticated user to enable an information disclosure via local access." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-347", "description": "CWE-347 Improper Verification of Cryptographic Signature", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-27T19:04:41.063Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2023-39211", "datePublished": "2023-08-08T21:30:46.350Z", "dateReserved": "2023-07-25T18:38:00.938Z", "dateUpdated": "2024-10-10T16:20:17.820Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-24691
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Video Communications, Inc. | Zoom Desktop Client for Windows, Zoom VDI Client for Windows, and Zoom Meeting SDK for Windows |
Version: see references |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T23:28:11.835Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.zoom.com/en/trust/security-bulletin/ZSB-24008/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Zoom Desktop Client for Windows, Zoom VDI Client for Windows, and Zoom Meeting SDK for Windows", "vendor": "Zoom Video Communications, Inc.", "versions": [ { "status": "affected", "version": "see references" } ] } ], "datePublic": "2024-02-13T13:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper input validation in Zoom Desktop Client for Windows, Zoom VDI Client for Windows, and Zoom Meeting SDK for Windows may allow an unauthenticated user to conduct an escalation of privilege via network access.\u003cbr\u003e" } ], "value": "Improper input validation in Zoom Desktop Client for Windows, Zoom VDI Client for Windows, and Zoom Meeting SDK for Windows may allow an unauthenticated user to conduct an escalation of privilege via network access." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.6, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-176", "description": "CWE-176: Improper Handling of Unicode Encoding", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-20T14:48:21.535Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://www.zoom.com/en/trust/security-bulletin/ZSB-24008/" } ], "source": { "discovery": "UNKNOWN" }, "title": "Zoom Desktop Client for Windows, Zoom VDI Client for Windows, and Zoom Meeting SDK for Windows - Improper Input Validation", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2024-24691", "datePublished": "2024-02-14T00:01:30.884Z", "dateReserved": "2024-01-26T22:56:14.680Z", "dateUpdated": "2024-09-20T14:48:21.535Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-43585
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Video Communications, Inc. | Zoom Mobile App for iOS and SDKs for iOS |
Version: before 5.16.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:44:43.663Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.zoom.com/en/trust/security-bulletin/ZSB-23058/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "iOS" ], "product": "Zoom Mobile App for iOS and SDKs for iOS", "vendor": "Zoom Video Communications, Inc.", "versions": [ { "status": "affected", "version": "before 5.16.0" } ] } ], "datePublic": "2023-12-12T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper access control in Zoom Mobile App for iOS and Zoom SDKs for iOS before version 5.16.5 may allow an authenticated user to conduct a disclosure of information via network access." } ], "value": "Improper access control in Zoom Mobile App for iOS and Zoom SDKs for iOS before version 5.16.5 may allow an authenticated user to conduct a disclosure of information via network access." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-449", "description": "CWE-449: The UI Performs the Wrong Action", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-27T19:16:27.688Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://www.zoom.com/en/trust/security-bulletin/ZSB-23058/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2023-43585", "datePublished": "2023-12-13T22:15:58.457Z", "dateReserved": "2023-09-19T22:05:40.665Z", "dateUpdated": "2024-09-27T19:16:27.688Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-43588
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Video Communications, Inc. | Zoom Clients |
Version: see references |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:44:43.701Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-43588", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-29T15:33:33.640598Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-29T15:39:14.149Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows", "MacOS", "Linux", "iOS" ], "product": "Zoom Clients", "vendor": "Zoom Video Communications, Inc.", "versions": [ { "status": "affected", "version": "see references" } ] } ], "datePublic": "2023-11-14T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Insufficient control flow management in some Zoom clients may allow an authenticated user to conduct an information disclosure via network access.\u003cbr\u003e\u003cbr\u003e" } ], "value": "Insufficient control flow management in some Zoom clients may allow an authenticated user to conduct an information disclosure via network access." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-449", "description": "CWE-449: The UI Performs the Wrong Action", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-20T14:58:08.976Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2023-43588", "datePublished": "2023-11-14T23:11:18.161Z", "dateReserved": "2023-09-19T22:05:40.666Z", "dateUpdated": "2024-09-20T14:58:08.976Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39218
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Video Communications, Inc. | Zoom Clients |
Version: before 5.14.10 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:02:05.243Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39218", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-10T16:20:49.320796Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-10T16:20:58.392Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Zoom Clients", "vendor": "Zoom Video Communications, Inc.", "versions": [ { "status": "affected", "version": "before 5.14.10" } ] } ], "datePublic": "2023-08-08T15:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Client-side enforcement of server-side security in Zoom clients before 5.14.10 may allow a privileged user to enable information disclosure via network access." } ], "value": "Client-side enforcement of server-side security in Zoom clients before 5.14.10 may allow a privileged user to enable information disclosure via network access." } ], "impacts": [ { "capecId": "CAPEC-22", "descriptions": [ { "lang": "en", "value": "CAPEC-22: Exploiting Trust in Client" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-602", "description": "CWE-602: Client-Side Enforcement of Server-Side Security", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-08T17:54:59.577Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2023-39218", "datePublished": "2023-08-08T17:54:59.577Z", "dateReserved": "2023-07-25T18:38:00.939Z", "dateUpdated": "2024-10-10T16:20:58.392Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-28599
Vulnerability from cvelistv5
Vendor | Product | Version | ||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Zoom Video Communications, Inc. | Zoom for Android |
Version: before 5.13.10 |
|||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T13:43:23.583Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-28599", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-02T20:02:14.695132Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-02T20:02:33.519Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Zoom for Android", "vendor": "Zoom Video Communications, Inc.", "versions": [ { "status": "affected", "version": "before 5.13.10" } ] }, { "defaultStatus": "unaffected", "product": "Zoom for iOS", "vendor": "Zoom Video Communications, Inc.", "versions": [ { "status": "affected", "version": "before 5.13.10" } ] }, { "defaultStatus": "unaffected", "product": "Zoom for Linux", "vendor": "Zoom Video Communications, Inc.", "versions": [ { "status": "affected", "version": "before 5.13.10" } ] }, { "defaultStatus": "unaffected", "product": "Zoom for macOS", "vendor": "Zoom Video Communications, Inc.", "versions": [ { "status": "affected", "version": "before 5.13.10" } ] }, { "defaultStatus": "unaffected", "product": "Zoom for Windows", "vendor": "Zoom Video Communications, Inc.", "versions": [ { "status": "affected", "version": "before 5.13.10" } ] } ], "datePublic": "2023-06-13T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Zoom clients prior to 5.13.10 contain an HTML injection vulnerability. A malicious user could inject HTML into their display name potentially leading a victim to a malicious website during meeting creation.\u003cbr\u003e\u003cbr\u003e" } ], "value": "Zoom clients prior to 5.13.10 contain an HTML injection vulnerability. A malicious user could inject HTML into their display name potentially leading a victim to a malicious website during meeting creation." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-19T13:40:50.630Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2023-28599", "datePublished": "2023-06-13T16:55:46.889Z", "dateReserved": "2023-03-17T13:27:32.368Z", "dateUpdated": "2025-01-02T20:02:33.519Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-28597
Vulnerability from cvelistv5
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Zoom Video Communications Inc | Zoom (for Android, iOS, Linux, macOS, and Windows) |
Version: unspecified < 5.13.5 |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T13:43:22.755Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-28597", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-19T15:26:38.358743Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-501", "description": "CWE-501 Trust Boundary Violation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-19T15:27:48.810Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Zoom (for Android, iOS, Linux, macOS, and Windows)", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "5.13.5", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Zoom Rooms (for Android, iOS, Linux, macOS, and Windows)", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "5.13.5", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Zoom VDI for Windows", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "5.13.10", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2023-03-14T00:00:00.000Z", "descriptions": [ { "lang": "en", "value": "Zoom clients prior to 5.13.5 contain an improper trust boundary implementation vulnerability. If a victim saves a local recording to an SMB location and later opens it using a link from Zoom\u2019s web portal, an attacker positioned on an adjacent network to the victim client could set up a malicious SMB server to respond to client requests, causing the client to execute attacker controlled executables. This could result in an attacker gaining access to a user\u0027s device and data, and remote code execution." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-501", "description": "CWE-501: Trust Boundary Violation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-27T00:00:00.000Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "source": { "discovery": "INTERNAL" }, "title": "Improper trust boundary implementation for SMB in Zoom Clients", "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2023-28597", "datePublished": "2023-03-27T00:00:00.000Z", "dateReserved": "2023-03-17T00:00:00.000Z", "dateUpdated": "2025-02-19T15:27:48.810Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39208
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Video Communications, Inc. | Zoom Desktop Client for Linux |
Version: before version 5.15.10 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:02:06.375Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39208", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-26T14:11:16.011340Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-26T14:11:34.888Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Linux" ], "product": "Zoom Desktop Client for Linux", "vendor": "Zoom Video Communications, Inc.", "versions": [ { "status": "affected", "version": "before version 5.15.10" } ] } ], "datePublic": "2023-09-12T15:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper input validation in Zoom Desktop Client for Linux before version 5.15.10 may allow an unauthenticated user to conduct a denial of service via network access." } ], "value": "Improper input validation in Zoom Desktop Client for Linux before version 5.15.10 may allow an unauthenticated user to conduct a denial of service via network access." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-27T19:02:37.370Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2023-39208", "datePublished": "2023-09-12T19:55:02.168Z", "dateReserved": "2023-07-25T18:37:58.425Z", "dateUpdated": "2024-09-27T19:02:37.370Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-13449
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T23:49:25.032Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://medium.com/%40jonathan.leitschuh/zoom-zero-day-4-million-webcams-maybe-an-rce-just-get-them-to-visit-your-website-ac75c83f4ef5" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://assets.zoom.us/docs/pdf/Zoom+Response+Video-On+Vulnerability.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://blog.zoom.us/wordpress/2019/07/08/response-to-video-on-concern/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://twitter.com/zoom_us/status/1148710712241295361" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugs.chromium.org/p/chromium/issues/detail?id=951540" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Zoom Client before 4.4.2 on macOS, remote attackers can cause a denial of service (continual focus grabs) via a sequence of invalid launch?action=join\u0026confno= requests to localhost port 19421." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-07-12T11:43:12", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://medium.com/%40jonathan.leitschuh/zoom-zero-day-4-million-webcams-maybe-an-rce-just-get-them-to-visit-your-website-ac75c83f4ef5" }, { "tags": [ "x_refsource_MISC" ], "url": "https://assets.zoom.us/docs/pdf/Zoom+Response+Video-On+Vulnerability.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://blog.zoom.us/wordpress/2019/07/08/response-to-video-on-concern/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://twitter.com/zoom_us/status/1148710712241295361" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugs.chromium.org/p/chromium/issues/detail?id=951540" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-13449", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In the Zoom Client before 4.4.2 on macOS, remote attackers can cause a denial of service (continual focus grabs) via a sequence of invalid launch?action=join\u0026confno= requests to localhost port 19421." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://medium.com/@jonathan.leitschuh/zoom-zero-day-4-million-webcams-maybe-an-rce-just-get-them-to-visit-your-website-ac75c83f4ef5", "refsource": "MISC", "url": "https://medium.com/@jonathan.leitschuh/zoom-zero-day-4-million-webcams-maybe-an-rce-just-get-them-to-visit-your-website-ac75c83f4ef5" }, { "name": "https://assets.zoom.us/docs/pdf/Zoom+Response+Video-On+Vulnerability.pdf", "refsource": "MISC", "url": "https://assets.zoom.us/docs/pdf/Zoom+Response+Video-On+Vulnerability.pdf" }, { "name": "https://blog.zoom.us/wordpress/2019/07/08/response-to-video-on-concern/", "refsource": "MISC", "url": "https://blog.zoom.us/wordpress/2019/07/08/response-to-video-on-concern/" }, { "name": "https://twitter.com/zoom_us/status/1148710712241295361", "refsource": "MISC", "url": "https://twitter.com/zoom_us/status/1148710712241295361" }, { "name": "https://bugs.chromium.org/p/chromium/issues/detail?id=951540", "refsource": "MISC", "url": "https://bugs.chromium.org/p/chromium/issues/detail?id=951540" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-13449", "datePublished": "2019-07-09T05:48:41", "dateReserved": "2019-07-09T00:00:00", "dateUpdated": "2024-08-04T23:49:25.032Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-36535
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Video Communications, Inc. | Zoom Clients |
Version: before 5.14.10 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:52:52.352Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-36535", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-08T15:00:22.199594Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-08T15:03:49.453Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Zoom Clients", "vendor": "Zoom Video Communications, Inc.", "versions": [ { "status": "affected", "version": "before 5.14.10" } ] } ], "datePublic": "2023-08-08T15:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Client-side enforcement of server-side security in Zoom clients before 5.14.10 may allow an authenticated user to enable information disclosure via network access." } ], "value": "Client-side enforcement of server-side security in Zoom clients before 5.14.10 may allow an authenticated user to enable information disclosure via network access." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-449", "description": "CWE-449: The UI Performs the Wrong Action", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-27T18:47:30.828Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2023-36535", "datePublished": "2023-08-08T17:39:51.259Z", "dateReserved": "2023-06-22T18:04:31.168Z", "dateUpdated": "2024-10-08T15:03:49.453Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-34114
Vulnerability from cvelistv5
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | Zoom Video Communications, Inc. | Zoom for Windows Client |
Version: before 5.14.10 |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:01:54.230Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-34114", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-02T19:56:43.010150Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-02T19:57:07.764Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Zoom for Windows Client", "vendor": "Zoom Video Communications, Inc.", "versions": [ { "status": "affected", "version": "before 5.14.10" } ] }, { "defaultStatus": "unaffected", "product": "Zoom for MacOS Client", "vendor": "Zoom Video Communications, Inc.", "versions": [ { "status": "affected", "version": "before 5.14.10" } ] } ], "datePublic": "2023-06-13T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Exposure of resource to wrong sphere in Zoom for Windows and Zoom for MacOS clients before 5.14.10 may allow an authenticated user to potentially enable information disclosure via network access. " } ], "value": "Exposure of resource to wrong sphere in Zoom for Windows and Zoom for MacOS clients before 5.14.10 may allow an authenticated user to potentially enable information disclosure via network access. " } ], "impacts": [ { "capecId": "CAPEC-131", "descriptions": [ { "lang": "en", "value": "CAPEC-131: Resource Leak Exposure" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-668", "description": "CWE-668 Exposure of Resource to Wrong Sphere", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-13T18:50:16.847Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2023-34114", "datePublished": "2023-06-13T18:37:22.969Z", "dateReserved": "2023-05-25T22:01:29.097Z", "dateUpdated": "2025-01-02T19:57:07.764Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-43583
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Video Communications, Inc. | Zoom Mobile App for Android, Zoom Mobile App for iOS and Zoom SDK |
Version: before 5.16.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:44:43.781Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.zoom.com/en/trust/security-bulletin/ZSB-23056/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Android", "iOS" ], "product": "Zoom Mobile App for Android, Zoom Mobile App for iOS and Zoom SDK", "vendor": "Zoom Video Communications, Inc.", "versions": [ { "status": "affected", "version": "before 5.16.0" } ] } ], "datePublic": "2023-12-12T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Cryptographic issues Zoom Mobile App for Android, Zoom Mobile App for iOS, and Zoom SDKs for Android and iOS before version 5.16.0 may allow a privileged user to conduct a disclosure of information via network access." } ], "value": "Cryptographic issues Zoom Mobile App for Android, Zoom Mobile App for iOS, and Zoom SDKs for Android and iOS before version 5.16.0 may allow a privileged user to conduct a disclosure of information via network access." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-798", "description": "CWE-798 Use of Hard-coded Credentials", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-19T13:55:21.591Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://www.zoom.com/en/trust/security-bulletin/ZSB-23056/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2023-43583", "datePublished": "2023-12-13T22:08:42.326Z", "dateReserved": "2023-09-19T22:05:40.665Z", "dateUpdated": "2024-09-19T13:55:21.591Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-28602
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Video Communications, Inc. | Zoom for Windows Client |
Version: before 5.13.5 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T13:43:23.585Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-28602", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-02T20:11:31.128284Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-02T20:11:44.583Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Zoom for Windows Client", "vendor": "Zoom Video Communications, Inc.", "versions": [ { "status": "affected", "version": "before 5.13.5" } ] } ], "datePublic": "2023-06-13T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Zoom for Windows clients prior to 5.13.5 contain an improper verification of cryptographic signature vulnerability. A malicious user may potentially downgrade Zoom Client components to previous versions." } ], "value": "Zoom for Windows clients prior to 5.13.5 contain an improper verification of cryptographic signature vulnerability. A malicious user may potentially downgrade Zoom Client components to previous versions." } ], "impacts": [ { "capecId": "CAPEC-554", "descriptions": [ { "lang": "en", "value": "CAPEC-554: Functionality Bypass" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.8, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-347", "description": "CWE-347 Improper Verification of Cryptographic Signature", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-13T18:53:34.369Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2023-28602", "datePublished": "2023-06-13T17:30:07.510Z", "dateReserved": "2023-03-17T13:27:32.368Z", "dateUpdated": "2025-01-02T20:11:44.583Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-36539
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Video Communications, Inc. | Zoom clients |
Version: See references link for ZSB-23025 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:52:52.360Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-36539", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-28T13:04:31.982326Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-28T13:04:46.477Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Zoom clients", "vendor": "Zoom Video Communications, Inc.", "versions": [ { "status": "affected", "version": "See references link for ZSB-23025" } ] } ], "datePublic": "2023-06-30T02:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(247, 247, 250);\"\u003eExposure of information intended to be encrypted by some Zoom clients may lead to disclosure of sensitive information.\u003c/span\u003e" } ], "value": "Exposure of information intended to be encrypted by some Zoom clients may lead to disclosure of sensitive information." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-325", "description": "CWE-325 Missing Cryptographic Step", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-18T18:25:53.635Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2023-36539", "datePublished": "2023-06-30T02:01:21.401Z", "dateReserved": "2023-06-22T18:04:31.169Z", "dateUpdated": "2024-10-28T13:04:46.477Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-22881
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Video Communications Inc | Zoom (for Android, iOS, Linux, macOS, and Windows) clients before version 5.13.5 |
Version: unspecified < 5.13.5 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:20:31.192Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Zoom (for Android, iOS, Linux, macOS, and Windows) clients before version 5.13.5", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "5.13.5", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2023-03-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Zoom clients before version 5.13.5 contain a STUN parsing vulnerability. A malicious actor could send specially crafted UDP traffic to a victim Zoom client to remotely cause the client to crash, causing a denial of service." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-16T00:00:00", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "source": { "discovery": "INTERNAL" }, "title": "Denial of Service in Zoom Clients", "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2023-22881", "datePublished": "2023-03-16T00:00:00", "dateReserved": "2023-01-09T00:00:00", "dateUpdated": "2024-08-02T10:20:31.192Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-28755
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://explore.zoom.us/en/trust/security/security-bulletin/ | x_refsource_MISC |
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | Zoom Video Communications Inc | Zoom Client for Meetings (for Android, iOS, Linux, macOS, and Windows) |
Version: unspecified < 5.11.0 |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:03:52.578Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Zoom Client for Meetings (for Android, iOS, Linux, macOS, and Windows)", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "5.11.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Zoom VDI Windows Meeting Clients", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "5.10.7", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-08-09T00:00:00", "descriptions": [ { "lang": "en", "value": "The Zoom Client for Meetings (for Android, iOS, Linux, macOS, and Windows) before version 5.11.0 are susceptible to a URL parsing vulnerability. If a malicious Zoom meeting URL is opened, the malicious link may direct the user to connect to an arbitrary network address, leading to additional attacks including the potential for remote code execution through launching executables from arbitrary paths." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.6, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-11T14:55:46", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "source": { "discovery": "INTERNAL" }, "title": "Improper URL parsing in Zoom Clients", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@zoom.us", "DATE_PUBLIC": "2022-08-09", "ID": "CVE-2022-28755", "STATE": "PUBLIC", "TITLE": "Improper URL parsing in Zoom Clients" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Zoom Client for Meetings (for Android, iOS, Linux, macOS, and Windows)", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.11.0" } ] } }, { "product_name": "Zoom VDI Windows Meeting Clients", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.10.7" } ] } } ] }, "vendor_name": "Zoom Video Communications Inc" } ] } }, "credit": [ { "lang": "eng" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Zoom Client for Meetings (for Android, iOS, Linux, macOS, and Windows) before version 5.11.0 are susceptible to a URL parsing vulnerability. If a malicious Zoom meeting URL is opened, the malicious link may direct the user to connect to an arbitrary network address, leading to additional attacks including the potential for remote code execution through launching executables from arbitrary paths." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.6, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20 Improper Input Validation" } ] } ] }, "references": { "reference_data": [ { "name": "https://explore.zoom.us/en/trust/security/security-bulletin/", "refsource": "MISC", "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ] }, "source": { "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2022-28755", "datePublished": "2022-08-11T14:55:46.515107Z", "dateReserved": "2022-04-06T00:00:00", "dateUpdated": "2024-09-17T02:53:24.397Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-24698
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Video Communications, Inc. | Zoom Clients |
Version: see references |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-24698", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-14T15:30:17.531210Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:43:32.245Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T23:28:11.903Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.zoom.com/en/trust/security-bulletin/ZSB-24005/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows", "iOS", "Linux", "Android" ], "product": "Zoom Clients", "vendor": "Zoom Video Communications, Inc.", "versions": [ { "status": "affected", "version": "see references" } ] } ], "datePublic": "2024-02-13T13:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper authentication in some Zoom clients may allow a privileged user to conduct a disclosure of information via local access.\u003cbr\u003e" } ], "value": "Improper authentication in some Zoom clients may allow a privileged user to conduct a disclosure of information via local access." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-449", "description": "CWE-449: The UI Performs the Wrong Action", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-27T19:28:28.333Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://www.zoom.com/en/trust/security-bulletin/ZSB-24005/" } ], "source": { "discovery": "UNKNOWN" }, "title": "Zoom Clients - Improper Authentication", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2024-24698", "datePublished": "2024-02-13T23:56:14.515Z", "dateReserved": "2024-01-26T22:56:14.681Z", "dateUpdated": "2024-09-27T19:28:28.333Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-34116
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Video Communications, Inc. | Zoom Desktop Client for Windows |
Version: before 5.15.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:01:54.218Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-34116", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-22T20:38:53.776208Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-22T20:41:18.163Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Zoom Desktop Client for Windows", "vendor": "Zoom Video Communications, Inc.", "versions": [ { "status": "affected", "version": "before 5.15.0" } ] } ], "datePublic": "2023-07-11T12:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper input validation in the Zoom Desktop Client for Windows before version 5.15.0 may allow an unauthorized user to enable an escalation of privilege via network access.\u003cbr\u003e" } ], "value": "Improper input validation in the Zoom Desktop Client for Windows before version 5.15.0 may allow an unauthorized user to enable an escalation of privilege via network access." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-19T19:28:14.920Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2023-34116", "datePublished": "2023-07-11T16:56:16.132Z", "dateReserved": "2023-05-25T22:01:29.097Z", "dateUpdated": "2024-10-22T20:41:18.163Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-36532
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Video Communications, Inc. | Zoom Clients |
Version: before 5.14.5 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:52:52.384Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-36532", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-09T16:16:56.351712Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-09T16:25:28.757Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Zoom Clients", "vendor": "Zoom Video Communications, Inc.", "versions": [ { "status": "affected", "version": "before 5.14.5" } ] } ], "datePublic": "2023-08-08T15:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Buffer overflow in Zoom Clients before 5.14.5 may allow an unauthenticated user to enable a denial of service via network access." } ], "value": "Buffer overflow in Zoom Clients before 5.14.5 may allow an unauthenticated user to enable a denial of service via network access." } ], "impacts": [ { "capecId": "CAPEC-100", "descriptions": [ { "lang": "en", "value": "CAPEC-100 Overflow Buffers" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122: Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-08T17:30:58.217Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2023-36532", "datePublished": "2023-08-08T17:30:58.217Z", "dateReserved": "2023-06-22T18:04:31.168Z", "dateUpdated": "2024-10-09T16:25:28.757Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39206
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Video Communications, Inc. | Zoom Clients |
Version: see references |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:02:06.479Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39206", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-29T15:33:18.137787Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-29T15:45:07.488Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows", "MacOS", "Linux", "iOS", "Android" ], "product": "Zoom Clients", "vendor": "Zoom Video Communications, Inc.", "versions": [ { "status": "affected", "version": "see references" } ] } ], "datePublic": "2023-11-14T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Buffer overflow in some Zoom clients may allow an unauthenticated user to conduct a denial of service via network access." } ], "value": "Buffer overflow in some Zoom clients may allow an unauthenticated user to conduct a denial of service via network access." } ], "impacts": [ { "capecId": "CAPEC-100", "descriptions": [ { "lang": "en", "value": "CAPEC-100 Overflow Buffers" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-14T23:02:41.332Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2023-39206", "datePublished": "2023-11-14T23:02:41.332Z", "dateReserved": "2023-07-25T18:37:58.424Z", "dateUpdated": "2024-08-29T15:45:07.488Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-49647
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Video Communications, Inc. | Zoom Desktop Client for Windows, Zoom VDI Client for Windows, and Zoom SDKs for Windows before version 5.16.10 |
Version: before 5.16.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:01:25.581Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.zoom.com/en/trust/security-bulletin/ZSB-24001/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Zoom Desktop Client for Windows, Zoom VDI Client for Windows, and Zoom SDKs for Windows before version 5.16.10", "vendor": "Zoom Video Communications, Inc.", "versions": [ { "status": "affected", "version": "before 5.16.0" } ] } ], "datePublic": "2024-01-09T13:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper access control in Zoom Desktop Client for Windows, Zoom VDI Client for Windows, and Zoom SDKs for Windows before version 5.16.10 may allow an authenticated user to conduct an escalation of privilege via local access." } ], "value": "Improper access control in Zoom Desktop Client for Windows, Zoom VDI Client for Windows, and Zoom SDKs for Windows before version 5.16.10 may allow an authenticated user to conduct an escalation of privilege via local access." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-266", "description": "CWE-266: Incorrect Privilege Assignment", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-20T14:52:01.494Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://www.zoom.com/en/trust/security-bulletin/ZSB-24001/" } ], "source": { "discovery": "UNKNOWN" }, "title": "Zoom Desktop Client for Windows - Improper Access Control", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2023-49647", "datePublished": "2024-01-12T21:44:00.743Z", "dateReserved": "2023-11-28T18:18:33.930Z", "dateUpdated": "2024-09-20T14:52:01.494Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-28133
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-044.txt | x_refsource_MISC | |
https://zoom.us/trust/security/security-bulletin | x_refsource_MISC | |
https://www.youtube.com/watch?v=SonmmgQlLzg | x_refsource_MISC | |
https://www.syss.de/pentest-blog/syss-2020-044-sicherheitsproblem-in-screen-sharing-funktionalitaet-von-zoom-cve-2021-28133 | x_refsource_MISC | |
http://seclists.org/fulldisclosure/2021/Mar/48 | mailing-list, x_refsource_FULLDISC | |
https://thehackernews.com/2021/03/new-zoom-screen-sharing-bug-lets-other.html | x_refsource_MISC | |
http://packetstormsecurity.com/files/161897/Zoom-5.4.3-54779.1115-5.5.4-13142.0301-Information-Disclosure.html | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T21:33:17.446Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-044.txt" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://zoom.us/trust/security/security-bulletin" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.youtube.com/watch?v=SonmmgQlLzg" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.syss.de/pentest-blog/syss-2020-044-sicherheitsproblem-in-screen-sharing-funktionalitaet-von-zoom-cve-2021-28133" }, { "name": "20210319 [SYSS-2020-044]: Zoom - Exposure of Resource to Wrong Sphere (CWE-668) (CVE-2021-28133)", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2021/Mar/48" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://thehackernews.com/2021/03/new-zoom-screen-sharing-bug-lets-other.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/161897/Zoom-5.4.3-54779.1115-5.5.4-13142.0301-Information-Disclosure.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Zoom through 5.5.4 sometimes allows attackers to read private information on a participant\u0027s screen, even though the participant never attempted to share the private part of their screen. When a user shares a specific application window via the Share Screen functionality, other meeting participants can briefly see contents of other application windows that were explicitly not shared. The contents of these other windows can (for instance) be seen for a short period of time when they overlay the shared window and get into focus. (An attacker can, of course, use a separate screen-recorder application, unsupported by Zoom, to save all such contents for later replays and analysis.) Depending on the unintentionally shared data, this short exposure of screen contents may be a more or less severe security issue." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-03-22T16:06:18", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-044.txt" }, { "tags": [ "x_refsource_MISC" ], "url": "https://zoom.us/trust/security/security-bulletin" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.youtube.com/watch?v=SonmmgQlLzg" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.syss.de/pentest-blog/syss-2020-044-sicherheitsproblem-in-screen-sharing-funktionalitaet-von-zoom-cve-2021-28133" }, { "name": "20210319 [SYSS-2020-044]: Zoom - Exposure of Resource to Wrong Sphere (CWE-668) (CVE-2021-28133)", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2021/Mar/48" }, { "tags": [ "x_refsource_MISC" ], "url": "https://thehackernews.com/2021/03/new-zoom-screen-sharing-bug-lets-other.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/161897/Zoom-5.4.3-54779.1115-5.5.4-13142.0301-Information-Disclosure.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-28133", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Zoom through 5.5.4 sometimes allows attackers to read private information on a participant\u0027s screen, even though the participant never attempted to share the private part of their screen. When a user shares a specific application window via the Share Screen functionality, other meeting participants can briefly see contents of other application windows that were explicitly not shared. The contents of these other windows can (for instance) be seen for a short period of time when they overlay the shared window and get into focus. (An attacker can, of course, use a separate screen-recorder application, unsupported by Zoom, to save all such contents for later replays and analysis.) Depending on the unintentionally shared data, this short exposure of screen contents may be a more or less severe security issue." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-044.txt", "refsource": "MISC", "url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-044.txt" }, { "name": "https://zoom.us/trust/security/security-bulletin", "refsource": "MISC", "url": "https://zoom.us/trust/security/security-bulletin" }, { "name": "https://www.youtube.com/watch?v=SonmmgQlLzg", "refsource": "MISC", "url": "https://www.youtube.com/watch?v=SonmmgQlLzg" }, { "name": "https://www.syss.de/pentest-blog/syss-2020-044-sicherheitsproblem-in-screen-sharing-funktionalitaet-von-zoom-cve-2021-28133", "refsource": "MISC", "url": "https://www.syss.de/pentest-blog/syss-2020-044-sicherheitsproblem-in-screen-sharing-funktionalitaet-von-zoom-cve-2021-28133" }, { "name": "20210319 [SYSS-2020-044]: Zoom - Exposure of Resource to Wrong Sphere (CWE-668) (CVE-2021-28133)", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/Mar/48" }, { "name": "https://thehackernews.com/2021/03/new-zoom-screen-sharing-bug-lets-other.html", "refsource": "MISC", "url": "https://thehackernews.com/2021/03/new-zoom-screen-sharing-bug-lets-other.html" }, { "name": "http://packetstormsecurity.com/files/161897/Zoom-5.4.3-54779.1115-5.5.4-13142.0301-Information-Disclosure.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/161897/Zoom-5.4.3-54779.1115-5.5.4-13142.0301-Information-Disclosure.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-28133", "datePublished": "2021-03-18T13:59:36", "dateReserved": "2021-03-10T00:00:00", "dateUpdated": "2024-08-03T21:33:17.446Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-34121
Vulnerability from cvelistv5
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Zoom Video Communications, Inc. | Zoom for Windows |
Version: before 5.14.0 |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:01:53.417Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-34121", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-02T19:59:23.228944Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-02T20:00:09.588Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Zoom for Windows", "vendor": "Zoom Video Communications, Inc.", "versions": [ { "status": "affected", "version": "before 5.14.0" } ] }, { "defaultStatus": "unaffected", "product": "Zoom Rooms Client for Windows", "vendor": "Zoom Video Communications, Inc.", "versions": [ { "status": "affected", "version": "before 5.14.0" } ] }, { "defaultStatus": "unaffected", "product": "Zoom VDI for Windows Meeting Clients", "vendor": "ZoomZoom Video Communications, Inc.", "versions": [ { "status": "affected", "version": "before 5.14.0" } ] } ], "datePublic": "2023-06-13T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper input validation in the Zoom for Windows, Zoom Rooms, Zoom VDI Windows Meeting clients before 5.14.0 may allow an authenticated user to potentially enable an escalation of privilege via network access." } ], "value": "Improper input validation in the Zoom for Windows, Zoom Rooms, Zoom VDI Windows Meeting clients before 5.14.0 may allow an authenticated user to potentially enable an escalation of privilege via network access." } ], "impacts": [ { "capecId": "CAPEC-153", "descriptions": [ { "lang": "en", "value": "CAPEC-153: Input Data Manipulation" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-19T19:34:39.015Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2023-34121", "datePublished": "2023-06-13T17:42:17.823Z", "dateReserved": "2023-05-25T22:01:29.098Z", "dateUpdated": "2025-01-02T20:00:09.588Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-22880
Vulnerability from cvelistv5
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Zoom Video Communications Inc | Zoom for Windows |
Version: unspecified < 5.13.3 |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:20:31.179Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Zoom for Windows", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "5.13.3", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Zoom Rooms for Windows", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "5.13.3", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Zoom VDI for Windows", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "5.13.1", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2023-03-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Zoom for Windows clients before version 5.13.3, Zoom Rooms for Windows clients before version 5.13.5 and Zoom VDI for Windows clients before 5.13.1 contain an information disclosure vulnerability. A recent update to the Microsoft Edge WebView2 runtime used by the affected Zoom clients, transmitted text to Microsoft\u2019s online Spellcheck service instead of the local Windows Spellcheck. Updating Zoom remediates this vulnerability by disabling the feature. Updating Microsoft Edge WebView2 Runtime to at least version 109.0.1481.0 and restarting Zoom remediates this vulnerability by updating Microsoft\u2019s telemetry behavior." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-16T00:00:00", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "source": { "discovery": "INTERNAL" }, "title": "Information Disclosure in Zoom for Windows Clients", "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2023-22880", "datePublished": "2023-03-16T00:00:00", "dateReserved": "2023-01-09T00:00:00", "dateUpdated": "2024-08-02T10:20:31.179Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-36540
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Video Communications, Inc. | Zoom Desktop Client for Windows |
Version: before 5.14.5 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:52:52.352Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-36540", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-04T17:29:45.993346Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-04T17:30:41.001Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Zoom Desktop Client for Windows", "vendor": "Zoom Video Communications, Inc.", "versions": [ { "status": "affected", "version": "before 5.14.5" } ] } ], "datePublic": "2023-08-08T15:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Untrusted search path in the installer for Zoom Desktop Client for Windows before 5.14.5 may allow an authenticated user to enable an escalation of privilege via local access." } ], "value": "Untrusted search path in the installer for Zoom Desktop Client for Windows before 5.14.5 may allow an authenticated user to enable an escalation of privilege via local access." } ], "impacts": [ { "capecId": "CAPEC-38", "descriptions": [ { "lang": "en", "value": "CAPEC-38 Leveraging/Manipulating Configuration File Search Paths" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-426", "description": "CWE-426: Untrusted Search Path", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-08T17:05:59.963Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2023-36540", "datePublished": "2023-08-08T17:05:59.963Z", "dateReserved": "2023-06-22T18:04:31.169Z", "dateUpdated": "2024-10-04T17:30:41.001Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-24695
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Video Communications, Inc. | Zoom Desktop Client for Windows, Zoom VDI Client for Windows, and Zoom Meeting SDK for Windows |
Version: see references |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T23:28:11.193Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.zoom.com/en/trust/security-bulletin/ZSB-24002/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Zoom Desktop Client for Windows, Zoom VDI Client for Windows, and Zoom Meeting SDK for Windows", "vendor": "Zoom Video Communications, Inc.", "versions": [ { "status": "affected", "version": "see references" } ] } ], "datePublic": "2024-02-13T13:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper input validation in Zoom Desktop Client for Windows, Zoom VDI Client for Windows, and Zoom Meeting SDK for Windows may allow an authenticated user to conduct a disclosure of information via network access.\u003cbr\u003e\u003cbr\u003e" } ], "value": "Improper input validation in Zoom Desktop Client for Windows, Zoom VDI Client for Windows, and Zoom Meeting SDK for Windows may allow an authenticated user to conduct a disclosure of information via network access.\n\n" } ], "impacts": [ { "capecId": "CAPEC-153", "descriptions": [ { "lang": "en", "value": "CAPEC-153 Input Data Manipulation" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-13T23:50:22.837Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://www.zoom.com/en/trust/security-bulletin/ZSB-24002/" } ], "source": { "discovery": "UNKNOWN" }, "title": " Zoom Desktop Client for Windows, Zoom VDI Client for Windows, and Zoom Meeting SDK for Windows - Improper Input Validation", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2024-24695", "datePublished": "2024-02-13T23:50:22.837Z", "dateReserved": "2024-01-26T22:56:14.681Z", "dateUpdated": "2024-08-01T23:28:11.193Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39199
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Video Communications, Inc. | Zoom Clients |
Version: see references |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:02:05.986Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39199", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-29T15:33:25.333843Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-29T15:44:49.906Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows", "MacOS", "Linux", "iOS", "Android" ], "product": "Zoom Clients", "vendor": "Zoom Video Communications, Inc.", "versions": [ { "status": "affected", "version": "see references" } ] } ], "datePublic": "2023-11-14T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Cryptographic issues with In-Meeting Chat for some Zoom clients may allow a privileged user to conduct an information disclosure via network access." } ], "value": "Cryptographic issues with In-Meeting Chat for some Zoom clients may allow a privileged user to conduct an information disclosure via network access." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-325", "description": "CWE-325 Missing Cryptographic Step", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-19T13:50:58.529Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2023-39199", "datePublished": "2023-11-14T23:06:21.805Z", "dateReserved": "2023-07-25T18:37:58.423Z", "dateUpdated": "2024-09-19T13:50:58.529Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-36541
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Video Communications, Inc. | Zoom Desktop Client for Windows |
Version: before 5.14.5 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:52:52.383Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-36541", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-10T16:24:05.567218Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-10T16:24:14.613Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Zoom Desktop Client for Windows", "vendor": "Zoom Video Communications, Inc.", "versions": [ { "status": "affected", "version": "before 5.14.5" } ] } ], "datePublic": "2023-08-08T15:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Insufficient verification of data authenticity in Zoom Desktop Client for Windows before 5.14.5 may allow an authenticated user to enable an escalation of privilege via network access." } ], "value": "Insufficient verification of data authenticity in Zoom Desktop Client for Windows before 5.14.5 may allow an authenticated user to enable an escalation of privilege via network access." } ], "impacts": [ { "capecId": "CAPEC-35", "descriptions": [ { "lang": "en", "value": "CAPEC-35 Leverage Executable Code in Non-Executable Files" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-345", "description": "CWE-345: Insufficient Verification of Data Authenticity", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-08T17:27:48.651Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2023-36541", "datePublished": "2023-08-08T17:27:48.651Z", "dateReserved": "2023-06-22T18:04:31.169Z", "dateUpdated": "2024-10-10T16:24:14.613Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-22882
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Video Communications Inc | Zoom (for Android, iOS, Linux, macOS, and Windows) clients before version 5.13.5 |
Version: unspecified < 5.13.5 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:20:31.207Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Zoom (for Android, iOS, Linux, macOS, and Windows) clients before version 5.13.5", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "5.13.5", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2023-03-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Zoom clients before version 5.13.5 contain a STUN parsing vulnerability. A malicious actor could send specially crafted UDP traffic to a victim Zoom client to remotely cause the client to crash, causing a denial of service." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-16T00:00:00", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "source": { "discovery": "INTERNAL" }, "title": "Denial of Service in Zoom Clients", "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2023-22882", "datePublished": "2023-03-16T00:00:00", "dateReserved": "2023-01-09T00:00:00", "dateUpdated": "2024-08-02T10:20:31.207Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39214
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Video Communications, Inc. | Zoom SDK's |
Version: before 5.15.5 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:02:06.417Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Zoom SDK\u0027s", "vendor": "Zoom Video Communications, Inc.", "versions": [ { "status": "affected", "version": "before 5.15.5" } ] } ], "datePublic": "2023-08-08T15:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Exposure of sensitive information in Zoom Client SDK\u0027s before 5.15.5 may allow an authenticated user to enable a denial of service via network access." } ], "value": "Exposure of sensitive information in Zoom Client SDK\u0027s before 5.15.5 may allow an authenticated user to enable a denial of service via network access." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-749", "description": "CWE-749: Exposed Dangerous Method or Function", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-27T19:07:24.020Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2023-39214", "datePublished": "2023-08-08T21:38:25.554Z", "dateReserved": "2023-07-25T18:38:00.938Z", "dateUpdated": "2024-09-27T19:07:24.020Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-15048
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://packetstormsecurity.com/files/145452/Zoom-Linux-Client-2.0.106600.0904-Buffer-Overflow.html | x_refsource_MISC | |
https://github.com/convisoappsec/advisories/blob/master/2017/CONVISO-17-002.txt | x_refsource_MISC | |
http://seclists.org/fulldisclosure/2017/Dec/46 | mailing-list, x_refsource_FULLDISC | |
https://www.exploit-db.com/exploits/43355/ | exploit, x_refsource_EXPLOIT-DB |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T19:42:22.373Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/145452/Zoom-Linux-Client-2.0.106600.0904-Buffer-Overflow.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/convisoappsec/advisories/blob/master/2017/CONVISO-17-002.txt" }, { "name": "20171215 [CONVISO-17-002] - Zoom Linux Client Stack-based Buffer Overflow Vulnerability", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2017/Dec/46" }, { "name": "43355", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/43355/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-12-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the ZoomLauncher binary in the Zoom client for Linux before 2.0.115900.1201 allows remote attackers to execute arbitrary code by leveraging the zoommtg:// scheme handler." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-12-20T10:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/145452/Zoom-Linux-Client-2.0.106600.0904-Buffer-Overflow.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/convisoappsec/advisories/blob/master/2017/CONVISO-17-002.txt" }, { "name": "20171215 [CONVISO-17-002] - Zoom Linux Client Stack-based Buffer Overflow Vulnerability", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2017/Dec/46" }, { "name": "43355", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/43355/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-15048", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in the ZoomLauncher binary in the Zoom client for Linux before 2.0.115900.1201 allows remote attackers to execute arbitrary code by leveraging the zoommtg:// scheme handler." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://packetstormsecurity.com/files/145452/Zoom-Linux-Client-2.0.106600.0904-Buffer-Overflow.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/145452/Zoom-Linux-Client-2.0.106600.0904-Buffer-Overflow.html" }, { "name": "https://github.com/convisoappsec/advisories/blob/master/2017/CONVISO-17-002.txt", "refsource": "MISC", "url": "https://github.com/convisoappsec/advisories/blob/master/2017/CONVISO-17-002.txt" }, { "name": "20171215 [CONVISO-17-002] - Zoom Linux Client Stack-based Buffer Overflow Vulnerability", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2017/Dec/46" }, { "name": "43355", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/43355/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-15048", "datePublished": "2017-12-19T15:00:00", "dateReserved": "2017-10-05T00:00:00", "dateUpdated": "2024-08-05T19:42:22.373Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-6109
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1055 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T08:47:41.110Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1055" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Zoom", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Zoom Client Application 4.6.10" } ] } ], "descriptions": [ { "lang": "en", "value": "An exploitable path traversal vulnerability exists in the Zoom client, version 4.6.10 processes messages including animated GIFs. A specially crafted chat message can cause an arbitrary file write, which could potentially be abused to achieve arbitrary code execution. An attacker needs to send a specially crafted message to a target user or a group to exploit this vulnerability." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-19T15:16:06", "orgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b", "shortName": "talos" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1055" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "talos-cna@cisco.com", "ID": "CVE-2020-6109", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Zoom", "version": { "version_data": [ { "version_value": "Zoom Client Application 4.6.10" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An exploitable path traversal vulnerability exists in the Zoom client, version 4.6.10 processes messages including animated GIFs. A specially crafted chat message can cause an arbitrary file write, which could potentially be abused to achieve arbitrary code execution. An attacker needs to send a specially crafted message to a target user or a group to exploit this vulnerability." } ] }, "impact": { "cvss": { "baseScore": 8.5, "baseSeverity": "High", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1055", "refsource": "MISC", "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1055" } ] } } } }, "cveMetadata": { "assignerOrgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b", "assignerShortName": "talos", "cveId": "CVE-2020-6109", "datePublished": "2020-06-08T13:22:31", "dateReserved": "2020-01-07T00:00:00", "dateUpdated": "2024-08-04T08:47:41.110Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-24696
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Video Communications, Inc. | Zoom Desktop Client for Windows, Zoom VDI Client for Windows, and Zoom Meeting SDK for Windows |
Version: see references |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-24696", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-14T16:51:24.559952Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:42:55.319Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T23:28:11.800Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.zoom.com/en/trust/security-bulletin/ZSB-24003/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Zoom Desktop Client for Windows, Zoom VDI Client for Windows, and Zoom Meeting SDK for Windows", "vendor": "Zoom Video Communications, Inc.", "versions": [ { "status": "affected", "version": "see references" } ] } ], "datePublic": "2024-02-13T13:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper input validation in Zoom Desktop Client for Windows, Zoom VDI Client for Windows, and Zoom Meeting SDK for Windows may allow an authenticated user to conduct a disclosure of information via network access.\u003cbr\u003e\u003cbr\u003e" } ], "value": "Improper input validation in Zoom Desktop Client for Windows, Zoom VDI Client for Windows, and Zoom Meeting SDK for Windows may allow an authenticated user to conduct a disclosure of information via network access.\n\n" } ], "impacts": [ { "capecId": "CAPEC-153", "descriptions": [ { "lang": "en", "value": "CAPEC-153 Input Data Manipulation" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-13T23:51:34.285Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://www.zoom.com/en/trust/security-bulletin/ZSB-24003/" } ], "source": { "discovery": "UNKNOWN" }, "title": "Zoom Desktop Client for Windows, Zoom VDI Client for Windows, and Zoom Meeting SDK for Windows - Improper Input Validation", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2024-24696", "datePublished": "2024-02-13T23:51:34.285Z", "dateReserved": "2024-01-26T22:56:14.681Z", "dateUpdated": "2024-08-01T23:28:11.800Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39215
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Video Communications, Inc. | Zoom Clients |
Version: see reference |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:02:06.576Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39215", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-25T14:56:51.859251Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-25T15:21:22.337Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Zoom Clients", "vendor": "Zoom Video Communications, Inc.", "versions": [ { "status": "affected", "version": "see reference" } ] } ], "datePublic": "2023-09-12T15:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper authentication in Zoom clients may allow an authenticated user to conduct a denial of service via network access." } ], "value": "Improper authentication in Zoom clients may allow an authenticated user to conduct a denial of service via network access." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-449", "description": "CWE-449: The UI Performs the Wrong Action", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-27T19:08:23.362Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2023-39215", "datePublished": "2023-09-12T19:53:25.817Z", "dateReserved": "2023-07-25T18:38:00.938Z", "dateUpdated": "2024-09-27T19:08:23.362Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-36534
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Video Communications, Inc. | Zoom Desktop Client for Windows |
Version: before 5.14.7 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:52:52.378Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-36534", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-10T16:23:33.681940Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-10T16:23:44.862Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Zoom Desktop Client for Windows", "vendor": "Zoom Video Communications, Inc.", "versions": [ { "status": "affected", "version": "before 5.14.7" } ] } ], "datePublic": "2023-08-08T15:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Path traversal in Zoom Desktop Client for Windows before 5.14.7 may allow an unauthenticated user to enable an escalation of privilege via network access." } ], "value": "Path traversal in Zoom Desktop Client for Windows before 5.14.7 may allow an unauthenticated user to enable an escalation of privilege via network access." } ], "impacts": [ { "capecId": "CAPEC-126", "descriptions": [ { "lang": "en", "value": "CAPEC-126 Path Traversal" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.3, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22: Path Traversal", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-08T17:35:29.278Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2023-36534", "datePublished": "2023-08-08T17:35:29.278Z", "dateReserved": "2023-06-22T18:04:31.168Z", "dateUpdated": "2024-10-10T16:23:44.862Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39209
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Video Communications, Inc. | Zoom Desktop Client for Windows |
Version: before 5.15.5 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:02:06.838Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39209", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-04T17:29:30.375597Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-04T17:31:35.321Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Zoom Desktop Client for Windows", "vendor": "Zoom Video Communications, Inc.", "versions": [ { "status": "affected", "version": "before 5.15.5" } ] } ], "datePublic": "2023-08-08T15:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper input validation in Zoom Desktop Client for Windows before 5.15.5 may allow an authenticated user to enable an information disclosure via network access." } ], "value": "Improper input validation in Zoom Desktop Client for Windows before 5.15.5 may allow an authenticated user to enable an information disclosure via network access." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-449", "description": "CWE-449: The UI Performs the Wrong Action", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-27T19:03:35.453Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2023-39209", "datePublished": "2023-08-08T21:39:52.327Z", "dateReserved": "2023-07-25T18:38:00.937Z", "dateUpdated": "2024-10-04T17:31:35.321Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39204
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Video Communications, Inc. | Zoom Clients |
Version: see references |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:02:06.451Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39204", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-29T15:12:00.315832Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-29T15:20:45.432Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows", "MacOS", "Linux", "iOS", "Android" ], "product": "Zoom Clients", "vendor": "Zoom Video Communications, Inc.", "versions": [ { "status": "affected", "version": "see references" } ] } ], "datePublic": "2023-11-14T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Buffer overflow in some Zoom clients may allow an unauthenticated user to conduct a denial of service via network access." } ], "value": "Buffer overflow in some Zoom clients may allow an unauthenticated user to conduct a denial of service via network access." } ], "impacts": [ { "capecId": "CAPEC-100", "descriptions": [ { "lang": "en", "value": "CAPEC-100 Overflow Buffers" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-14T22:28:44.622Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2023-39204", "datePublished": "2023-11-14T22:28:44.622Z", "dateReserved": "2023-07-25T18:37:58.424Z", "dateUpdated": "2024-08-29T15:20:45.432Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-43586
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Video Communications, Inc. | Zoom Desktop Client for Windows, Zoom VDI Client for Windows and Zoom SDKs for Windows |
Version: See references |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:44:43.849Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.zoom.com/en/trust/security-bulletin/ZSB-23059/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Zoom Desktop Client for Windows, Zoom VDI Client for Windows and Zoom SDKs for Windows", "vendor": "Zoom Video Communications, Inc.", "versions": [ { "status": "affected", "version": "See references" } ] } ], "datePublic": "2023-12-12T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Path traversal in Zoom Desktop Client for Windows, Zoom VDI Client for Windows, and Zoom SDKs for Windows may allow an authenticated user to conduct an escalation of privilege via network access." } ], "value": "Path traversal in Zoom Desktop Client for Windows, Zoom VDI Client for Windows, and Zoom SDKs for Windows may allow an authenticated user to conduct an escalation of privilege via network access." } ], "impacts": [ { "capecId": "CAPEC-126", "descriptions": [ { "lang": "en", "value": "CAPEC-126 Path Traversal" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-426", "description": "CWE-426 Untrusted Search Path", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-13T22:17:48.264Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://www.zoom.com/en/trust/security-bulletin/ZSB-23059/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2023-43586", "datePublished": "2023-12-13T22:17:48.264Z", "dateReserved": "2023-09-19T22:05:40.665Z", "dateUpdated": "2024-08-02T19:44:43.849Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-43582
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Video Communications, Inc. | Zoom Clients |
Version: see references |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:44:43.848Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-43582", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-29T15:33:44.880769Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-29T15:38:56.542Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows", "MacOS", "Linux", "iOS", "Android" ], "product": "Zoom Clients", "vendor": "Zoom Video Communications, Inc.", "versions": [ { "status": "affected", "version": "see references" } ] } ], "datePublic": "2023-11-14T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper authorization in some Zoom clients may allow an authorized user to conduct an escalation of privilege via network access.\u003cbr\u003e" } ], "value": "Improper authorization in some Zoom clients may allow an authorized user to conduct an escalation of privilege via network access." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-939", "description": "CWE-939 Improper Authorization in Handler for Custom URL Scheme", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-19T13:52:36.217Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2023-43582", "datePublished": "2023-11-14T23:12:32.799Z", "dateReserved": "2023-09-19T22:05:40.665Z", "dateUpdated": "2024-09-19T13:52:36.217Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-36928
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Video Communications Inc | Zoom for Android |
Version: unspecified < 5.13.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:21:32.309Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Zoom for Android", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "5.13.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2023-01-06T00:00:00", "descriptions": [ { "lang": "en", "value": "Zoom for Android clients before version 5.13.0 contain a path traversal vulnerability. A third party app could exploit this vulnerability to read and write to the Zoom application data directory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-35", "description": "CWE-35: Path Traversal", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-09T00:00:00", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "source": { "discovery": "EXTERNAL" }, "title": "Path Traversal in Zoom for Android Clients", "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2022-36928", "datePublished": "2023-01-09T00:00:00", "dateReserved": "2022-07-27T00:00:00", "dateUpdated": "2024-08-03T10:21:32.309Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-24690
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Video Communications, Inc. | Zoom Clients |
Version: see references |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T23:28:11.165Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.zoom.com/en/trust/security-bulletin/ZSB-24007/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-24690", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-16T18:16:12.891310Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-16T18:16:23.329Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows", "iOS", "Linux", "Android" ], "product": "Zoom Clients", "vendor": "Zoom Video Communications, Inc.", "versions": [ { "status": "affected", "version": "see references" } ] } ], "datePublic": "2024-02-13T13:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper input validation in some Zoom clients may allow an authenticated user to conduct a denial of service via network access.\u003cbr\u003e" } ], "value": "Improper input validation in some Zoom clients may allow an authenticated user to conduct a denial of service via network access." } ], "impacts": [ { "capecId": "CAPEC-153", "descriptions": [ { "lang": "en", "value": "CAPEC-153 Input Data Manipulation" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1284", "description": "CWE-1284: Improper Validation of Specified Quantity in Input", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-20T14:50:06.835Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://www.zoom.com/en/trust/security-bulletin/ZSB-24007/" } ], "source": { "discovery": "UNKNOWN" }, "title": "Zoom Clients - Improper Input Validation", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2024-24690", "datePublished": "2024-02-14T00:00:04.089Z", "dateReserved": "2024-01-26T22:56:14.680Z", "dateUpdated": "2024-09-20T14:50:06.835Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
ringcentral | ringcentral | 7.0.136380.0312 | |
zoom | zoom | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ringcentral:ringcentral:7.0.136380.0312:*:*:*:*:mac_os_x:*:*", "matchCriteriaId": "E94F8967-80DF-4B09-9008-66F16E7C0C66", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:mac_os_x:*:*", "matchCriteriaId": "9A2EE706-4B23-4B7B-BBFF-D30002BA943D", "versionEndIncluding": "4.4.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Zoom Client through 4.4.4 and RingCentral 7.0.136380.0312 on macOS, remote attackers can force a user to join a video call with the video camera active. This occurs because any web site can interact with the Zoom web server on localhost port 19421 or 19424. NOTE: a machine remains vulnerable if the Zoom Client was installed in the past and then uninstalled. Blocking exploitation requires additional steps, such as the ZDisableVideo preference and/or killing the web server, deleting the ~/.zoomus directory, and creating a ~/.zoomus plain file." }, { "lang": "es", "value": "En el Cliente Zoom hasta versi\u00f3n 4.4.4 y RingCentral versi\u00f3n 7.0.136380.0312 en macOS, los atacantes remotos pueden forzar a un usuario a unirse a una llamada de video con la c\u00e1mara de video activa. Esto ocurre porque cualquier sitio web puede interactuar con el servidor web de Zoom en el puerto host local 19421 o 19424. NOTA: una m\u00e1quina permanece vulnerable si el cliente Zoom fue instalado en el pasado y luego se desinstal\u00f3. El bloqueo de la operaci\u00f3n requiere pasos adicionales, tales como la preferencia ZDisableVideo y/o la eliminaci\u00f3n del servidor web, suprimiendo el directorio ~/.zoomus y creando un archivo plano ~/.zoomus." } ], "id": "CVE-2019-13450", "lastModified": "2024-11-21T04:24:55.590", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-07-09T06:15:10.820", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/109082" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://assets.zoom.us/docs/pdf/Zoom+Response+Video-On+Vulnerability.pdf" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://blog.zoom.us/wordpress/2019/07/08/response-to-video-on-concern/" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://bugs.chromium.org/p/chromium/issues/detail?id=951540" }, { "source": "cve@mitre.org", "url": "https://medium.com/%40jonathan.leitschuh/zoom-zero-day-4-million-webcams-maybe-an-rce-just-get-them-to-visit-your-website-ac75c83f4ef5" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://news.ycombinator.com/item?id=20387298" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://twitter.com/moreati/status/1148548799813640193" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://twitter.com/zoom_us/status/1148710712241295361" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/109082" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://assets.zoom.us/docs/pdf/Zoom+Response+Video-On+Vulnerability.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://blog.zoom.us/wordpress/2019/07/08/response-to-video-on-concern/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://bugs.chromium.org/p/chromium/issues/detail?id=951540" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://medium.com/%40jonathan.leitschuh/zoom-zero-day-4-million-webcams-maybe-an-rce-just-get-them-to-visit-your-website-ac75c83f4ef5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://news.ycombinator.com/item?id=20387298" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://twitter.com/moreati/status/1148548799813640193" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://twitter.com/zoom_us/status/1148710712241295361" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-862" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:android:*:*", "matchCriteriaId": "D266549E-02B0-4658-9D29-FD3AEE49676F", "versionEndExcluding": "5.13.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "7BE1C2CD-27E1-4F54-B0DF-87A509B91CEF", "versionEndExcluding": "5.13.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:linux:*:*", "matchCriteriaId": "DB1E61AA-28D0-4F15-857E-D647EF0EEA8E", "versionEndExcluding": "5.13.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:macos:*:*", "matchCriteriaId": "A4EF241A-A6BF-427F-AB42-013C8127944A", "versionEndExcluding": "5.13.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:windows:*:*", "matchCriteriaId": "4C67C911-6DC5-4443-8AA7-229C63E13D5C", "versionEndExcluding": "5.13.10", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Zoom clients prior to 5.13.10 contain an HTML injection vulnerability. A malicious user could inject HTML into their display name potentially leading a victim to a malicious website during meeting creation." } ], "id": "CVE-2023-28599", "lastModified": "2024-11-21T07:55:38.560", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-06-13T17:15:14.537", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "security@zoom.us", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-74" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
talos-cna@cisco.com | https://talosintelligence.com/vulnerability_reports/TALOS-2020-1056 | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://talosintelligence.com/vulnerability_reports/TALOS-2020-1056 | Exploit, Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:zoom:4.6.10:*:*:*:*:*:*:*", "matchCriteriaId": "64ED8012-19F9-492C-B8B0-EE65A4E41B7B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An exploitable partial path traversal vulnerability exists in the way Zoom Client version 4.6.10 processes messages including shared code snippets. A specially crafted chat message can cause an arbitrary binary planting which could be abused to achieve arbitrary code execution. An attacker needs to send a specially crafted message to a target user or a group to trigger this vulnerability. For the most severe effect, target user interaction is required." }, { "lang": "es", "value": "Se presenta una vulnerabilidad de salto de ruta parcial explotable en la manera en que Zoom Client versi\u00f3n 4.6.10 procesa mensajes que incluyen fragmentos de c\u00f3digo compartido. Un mensaje de chat especialmente dise\u00f1ado puede causar una plantaci\u00f3n binaria arbitraria que podr\u00eda ser abusada para lograr una ejecuci\u00f3n de c\u00f3digo arbitraria. Un atacante debe enviar un mensaje especialmente dise\u00f1ado a un usuario o grupo objetivo para desencadenar esta vulnerabilidad. Para el efecto m\u00e1s severo, una interacci\u00f3n del usuario objetivo es requerida" } ], "id": "CVE-2020-6110", "lastModified": "2024-11-21T05:35:07.020", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.3, "impactScore": 6.0, "source": "talos-cna@cisco.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-08T14:15:13.070", "references": [ { "source": "talos-cna@cisco.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1056" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1056" } ], "sourceIdentifier": "talos-cna@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "talos-cna@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:windows:*:*", "matchCriteriaId": "51DF366B-A683-4713-89AA-AAFAAC8A6A51", "versionEndExcluding": "5.15.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper input validation in the Zoom Desktop Client for Windows before version 5.15.0 may allow an unauthorized user to enable an escalation of privilege via network access." } ], "id": "CVE-2023-34116", "lastModified": "2024-11-21T08:06:34.870", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 4.7, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-07-11T17:15:13.097", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "security@zoom.us", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
4.4 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
Vendor | Product | Version | |
---|---|---|---|
zoom | meeting_software_development_kit | * | |
zoom | rooms | * | |
zoom | vdi_windows_meeting_clients | * | |
zoom | vdi_windows_meeting_clients | * | |
zoom | vdi_windows_meeting_clients | * | |
zoom | zoom | * | |
zoom | zoom | * | |
zoom | zoom | * | |
zoom | zoom | * | |
zoom | zoom | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:windows:*:*", "matchCriteriaId": "ED921F3E-F076-4037-BAE9-53BDC04F2A4C", "versionEndExcluding": "5.17.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:windows:*:*", "matchCriteriaId": "9D60A59A-2E09-48C6-82F6-995B7ADB330A", "versionEndExcluding": "5.17.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:vdi_windows_meeting_clients:*:*:*:*:*:windows:*:*", "matchCriteriaId": "6C7B8981-66F8-4309-98C6-63B4665229EF", "versionEndExcluding": "5.15.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:vdi_windows_meeting_clients:*:*:*:*:*:windows:*:*", "matchCriteriaId": "FDCC89D1-EB4D-496D-82C6-B0BBA942286F", "versionEndExcluding": "5.16.12", "versionStartExcluding": "5.15.15", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:vdi_windows_meeting_clients:*:*:*:*:*:windows:*:*", "matchCriteriaId": "ECD4FC8B-5FB2-4667-B92F-26F2A951EE40", "versionEndExcluding": "5.17.5", "versionStartExcluding": "5.16.12", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:android:*:*", "matchCriteriaId": "BA20AF82-C1DF-4C05-91ED-F5DC1A92C0A3", "versionEndExcluding": "5.17.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "D5C425F2-9B12-4E3A-88CD-BD7AC0EEB0F6", "versionEndExcluding": "5.17.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:linux:*:*", "matchCriteriaId": "5E7DB9AA-DB7D-4F3F-A7EA-A482F328F8AB", "versionEndExcluding": "5.17.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:macos:*:*", "matchCriteriaId": "6E5232D6-0338-4FCC-AB49-39EA6B75B91D", "versionEndExcluding": "5.17.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:windows:*:*", "matchCriteriaId": "8ED34AF6-F5F5-45A1-8AF1-C85064789454", "versionEndExcluding": "5.17.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper authentication in some Zoom clients may allow a privileged user to conduct a disclosure of information via local access." }, { "lang": "es", "value": "La autenticaci\u00f3n inadecuada en algunos clientes de Zoom puede permitir que un usuario privilegiado realice una divulgaci\u00f3n de informaci\u00f3n a trav\u00e9s del acceso local." } ], "id": "CVE-2024-24698", "lastModified": "2024-11-21T08:59:31.897", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 3.6, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-02-14T00:15:47.967", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://www.zoom.com/en/trust/security-bulletin/ZSB-24005/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.zoom.com/en/trust/security-bulletin/ZSB-24005/" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-449" } ], "source": "security@zoom.us", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
8.1 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:linux:*:*", "matchCriteriaId": "C993CD54-5D54-4979-84A7-E1B6AC13391C", "versionEndExcluding": "5.15.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:macos:*:*", "matchCriteriaId": "F20636D4-1E23-4703-9574-7E68DB9F6CF4", "versionEndExcluding": "5.15.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:windows:*:*", "matchCriteriaId": "D48D7F93-C36E-49EC-9767-EC9604750FE7", "versionEndExcluding": "5.15.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:android:*:*", "matchCriteriaId": "C7F7B4F1-B1C5-43FB-A41B-302675CE7DBD", "versionEndExcluding": "5.15.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:ipad_os:*:*", "matchCriteriaId": "6098D0DF-2760-44A3-88C3-F120EA4F9771", "versionEndExcluding": "5.15.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:macos:*:*", "matchCriteriaId": "6ADE88B6-FFDF-40CF-A262-41906B97669C", "versionEndExcluding": "5.15.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:windows:*:*", "matchCriteriaId": "0AE37FB8-AB87-4FCC-9D7A-375418FEE1A1", "versionEndExcluding": "5.15.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:android:*:*", "matchCriteriaId": "7DE837CD-CC55-4910-83B8-7295E544113A", "versionEndExcluding": "5.15.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "16F58270-1E18-4FF9-BABA-895F7018D514", "versionEndExcluding": "5.15.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:linux:*:*", "matchCriteriaId": "FB104E47-F37D-4B3D-8530-B87893D3AD90", "versionEndExcluding": "5.15.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:macos:*:*", "matchCriteriaId": "CB71D63A-ECCB-4371-B1E3-25BF96E5D84E", "versionEndExcluding": "5.15.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:windows:*:*", "matchCriteriaId": "61B77771-BBE7-49A8-82C4-0DC27D3D0E97", "versionEndExcluding": "5.15.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Exposure of sensitive information in Zoom Client SDK\u0027s before 5.15.5 may allow an authenticated user to enable a denial of service via network access." } ], "id": "CVE-2023-39214", "lastModified": "2024-11-21T08:14:55.807", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 4.7, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-08-08T22:15:10.737", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-749" } ], "source": "security@zoom.us", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-668" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:linux:*:*", "matchCriteriaId": "C7B42405-380C-42AD-9B87-99EB92E433BE", "versionEndExcluding": "5.15.10", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper input validation in Zoom Desktop Client for Linux before version 5.15.10 may allow an unauthenticated user to conduct a denial of service via network access." }, { "lang": "es", "value": "Una validaci\u00f3n de entrada incorrecta en Zoom Desktop Client para Linux anterior a la versi\u00f3n 5.15.10 puede permitir que un usuario no autenticado realice una denegaci\u00f3n de servicio a trav\u00e9s del acceso a la red." } ], "id": "CVE-2023-39208", "lastModified": "2024-11-21T08:14:54.987", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 2.5, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-09-12T20:15:09.007", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "security@zoom.us", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Vendor | Product | Version | |
---|---|---|---|
zoom | meeting_software_development_kit | * | |
zoom | video_software_development_kit | * | |
zoom | zoom | * | |
zoom | virtual_desktop_infrastructure | * | |
zoom | virtual_desktop_infrastructure | * | |
zoom | virtual_desktop_infrastructure | * | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:windows:*:*", "matchCriteriaId": "6283C30D-420E-4A6F-B4C3-A67923467553", "versionEndExcluding": "5.16.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:windows:*:*", "matchCriteriaId": "ACB8BA0C-2FE3-4AB2-8C43-1035A95408E1", "versionEndExcluding": "5.16.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:windows:*:*", "matchCriteriaId": "EE4453C1-144A-4101-935E-966676895835", "versionEndExcluding": "5.16.10", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:virtual_desktop_infrastructure:*:*:*:*:*:*:*:*", "matchCriteriaId": "D33A3D73-DB80-4376-A9EE-2905A4B0B4B7", "versionEndExcluding": "5.14.14", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:virtual_desktop_infrastructure:*:*:*:*:*:*:*:*", "matchCriteriaId": "33411E35-8D01-42E4-85D6-0FE2C416E697", "versionEndExcluding": "5.15.12", "versionStartIncluding": "5.15.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:virtual_desktop_infrastructure:*:*:*:*:*:*:*:*", "matchCriteriaId": "1865DF2E-65D2-4DEF-BFC5-5AC333AFF759", "versionEndExcluding": "5.16.10", "versionStartIncluding": "5.16.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper access control in Zoom Desktop Client for Windows, Zoom VDI Client for Windows, and Zoom SDKs for Windows before version 5.16.10 may allow an authenticated user to conduct an escalation of privilege via local access." }, { "lang": "es", "value": "Un control de acceso inadecuado en Zoom Desktop Client para Windows, Zoom VDI Client para Windows y Zoom SDK para Windows anteriores a la versi\u00f3n 5.16.10 puede permitir que un usuario autenticado realice una escalada de privilegios a trav\u00e9s del acceso local." } ], "id": "CVE-2023-49647", "lastModified": "2024-11-21T08:33:39.630", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 6.0, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-01-12T22:15:45.130", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://www.zoom.com/en/trust/security-bulletin/ZSB-24001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.zoom.com/en/trust/security-bulletin/ZSB-24001/" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-266" } ], "source": "security@zoom.us", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Vendor | Product | Version | |
---|---|---|---|
zoom | meeting_software_development_kit | * | |
zoom | rooms | * | |
zoom | vdi_windows_meeting_clients | * | |
zoom | vdi_windows_meeting_clients | * | |
zoom | vdi_windows_meeting_clients | * | |
zoom | video_software_development_kit | * | |
zoom | zoom | * | |
zoom | zoom | * | |
zoom | zoom | * | |
zoom | zoom | * | |
zoom | zoom | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:windows:*:*", "matchCriteriaId": "B72243E4-AFF7-4A69-934A-1170A6EDAE0F", "versionEndExcluding": "5.16.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:*:*:*", "matchCriteriaId": "61CCEE1E-F3C0-41EB-8DF2-4D3EA8600166", "versionEndExcluding": "5.17.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:vdi_windows_meeting_clients:*:*:*:*:*:windows:*:*", "matchCriteriaId": "DEC61EA8-8A9D-4E36-9B46-2B45ED1C5DB8", "versionEndExcluding": "5.14.14", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:vdi_windows_meeting_clients:*:*:*:*:*:windows:*:*", "matchCriteriaId": "390DFFB5-7BEA-41F2-B2E1-F0FED3766C1E", "versionEndExcluding": "5.15.12", "versionStartExcluding": "5.14.14", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:vdi_windows_meeting_clients:*:*:*:*:*:windows:*:*", "matchCriteriaId": "8B90CC0C-8000-44E1-8AA1-5E67081ECD2E", "versionEndExcluding": "5.16.10", "versionStartExcluding": "5.15.12", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:windows:*:*", "matchCriteriaId": "F58AB464-C80F-4E2B-9F13-BE9B19E3B5BE", "versionEndExcluding": "5.16.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:android:*:*", "matchCriteriaId": "F0EA451C-C4DC-48EF-A036-3EEA3E3ADD80", "versionEndExcluding": "5.16.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "C2BF4129-CA54-4ECB-9A6B-EC28445233DF", "versionEndExcluding": "5.16.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:linux:*:*", "matchCriteriaId": "AD4CD81C-1F22-45CA-8AB1-D6D59E819759", "versionEndExcluding": "5.16.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:macos:*:*", "matchCriteriaId": "BB9276FF-17D3-4FDB-91BB-2CE6E8BA61A0", "versionEndExcluding": "5.16.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:windows:*:*", "matchCriteriaId": "19B08EB3-7EBF-416F-91B9-4600E47567F7", "versionEndExcluding": "5.16.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper input validation in some Zoom clients may allow an authenticated user to conduct a denial of service via network access." }, { "lang": "es", "value": "Una validaci\u00f3n de entrada incorrecta en algunos clientes de Zoom puede permitir que un usuario autenticado realice una denegaci\u00f3n de servicio a trav\u00e9s del acceso a la red." } ], "id": "CVE-2024-24690", "lastModified": "2024-11-21T08:59:30.693", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.5, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-02-14T00:15:47.000", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://www.zoom.com/en/trust/security-bulletin/ZSB-24007/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.zoom.com/en/trust/security-bulletin/ZSB-24007/" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-1284" } ], "source": "security@zoom.us", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-1284" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Vendor | Product | Version | |
---|---|---|---|
zoom | meeting_software_development_kit | * | |
zoom | vdi_windows_meeting_clients | * | |
zoom | vdi_windows_meeting_clients | * | |
zoom | vdi_windows_meeting_clients | * | |
zoom | zoom | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:windows:*:*", "matchCriteriaId": "B72243E4-AFF7-4A69-934A-1170A6EDAE0F", "versionEndExcluding": "5.16.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:vdi_windows_meeting_clients:*:*:*:*:*:windows:*:*", "matchCriteriaId": "B91935BE-F245-4ADD-A206-D318618BAA1D", "versionEndExcluding": "5.15.15", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:vdi_windows_meeting_clients:*:*:*:*:*:windows:*:*", "matchCriteriaId": "FDCC89D1-EB4D-496D-82C6-B0BBA942286F", "versionEndExcluding": "5.16.12", "versionStartExcluding": "5.15.15", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:vdi_windows_meeting_clients:*:*:*:*:*:windows:*:*", "matchCriteriaId": "ECD4FC8B-5FB2-4667-B92F-26F2A951EE40", "versionEndExcluding": "5.17.5", "versionStartExcluding": "5.16.12", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:windows:*:*", "matchCriteriaId": "19B08EB3-7EBF-416F-91B9-4600E47567F7", "versionEndExcluding": "5.16.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper input validation in Zoom Desktop Client for Windows, Zoom VDI Client for Windows, and Zoom Meeting SDK for Windows may allow an authenticated user to conduct a disclosure of information via network access.\n\n" }, { "lang": "es", "value": "Una validaci\u00f3n de entrada incorrecta en Zoom Desktop Client para Windows, Zoom VDI Client para Windows y Zoom Meeting SDK para Windows puede permitir que un usuario autenticado realice una divulgaci\u00f3n de informaci\u00f3n a trav\u00e9s del acceso a la red." } ], "id": "CVE-2024-24695", "lastModified": "2024-11-21T08:59:31.423", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 4.0, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-02-14T00:15:47.393", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://www.zoom.com/en/trust/security-bulletin/ZSB-24002/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.zoom.com/en/trust/security-bulletin/ZSB-24002/" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "security@zoom.us", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:windows:*:*", "matchCriteriaId": "2EEE52E3-E80E-4CD2-B778-95F513E5EBFF", "versionEndExcluding": "5.14.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Zoom for Windows clients prior to 5.14.0 contain an improper restriction of operations within the bounds of a memory buffer vulnerability. A malicious user may alter protected Zoom Client memory buffer potentially causing integrity issues within the Zoom Client." } ], "id": "CVE-2023-28601", "lastModified": "2024-11-21T07:55:38.877", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 6.0, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-06-13T18:15:21.613", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-358" } ], "source": "security@zoom.us", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
7.7 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:windows:*:*", "matchCriteriaId": "DDDF143E-324E-4D0C-83D1-2E66DDE760E2", "versionEndExcluding": "5.13.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Zoom for Windows clients prior to 5.13.5 contain an improper verification of cryptographic signature vulnerability. A malicious user may potentially downgrade Zoom Client components to previous versions." } ], "id": "CVE-2023-28602", "lastModified": "2024-11-21T07:55:39.013", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.8, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.1, "impactScore": 1.4, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.1, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-06-13T18:15:21.683", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-347" } ], "source": "security@zoom.us", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-347" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Vendor | Product | Version | |
---|---|---|---|
zoom | meeting_software_development_kit | * | |
zoom | video_software_development_kit | * | |
zoom | virtual_desktop_infrastructure | * | |
zoom | virtual_desktop_infrastructure | * | |
zoom | zoom | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:windows:*:*", "matchCriteriaId": "B72243E4-AFF7-4A69-934A-1170A6EDAE0F", "versionEndExcluding": "5.16.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:windows:*:*", "matchCriteriaId": "F58AB464-C80F-4E2B-9F13-BE9B19E3B5BE", "versionEndExcluding": "5.16.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:virtual_desktop_infrastructure:*:*:*:*:*:*:*:*", "matchCriteriaId": "D33A3D73-DB80-4376-A9EE-2905A4B0B4B7", "versionEndExcluding": "5.14.14", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:virtual_desktop_infrastructure:*:*:*:*:*:*:*:*", "matchCriteriaId": "33411E35-8D01-42E4-85D6-0FE2C416E697", "versionEndExcluding": "5.15.12", "versionStartIncluding": "5.15.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:windows:*:*", "matchCriteriaId": "19B08EB3-7EBF-416F-91B9-4600E47567F7", "versionEndExcluding": "5.16.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Path traversal in Zoom Desktop Client for Windows, Zoom VDI Client for Windows, and Zoom SDKs for Windows may allow an authenticated user to conduct an escalation of privilege via network access." }, { "lang": "es", "value": "El path traversal en Zoom Desktop Client para Windows, Zoom VDI Client para Windows y Zoom SDK para Windows puede permitir que un usuario autenticado realice una escalada de privilegios a trav\u00e9s del acceso a la red." } ], "id": "CVE-2023-43586", "lastModified": "2024-11-21T08:24:26.853", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.0, "impactScore": 5.8, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-12-13T23:15:07.660", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://www.zoom.com/en/trust/security-bulletin/ZSB-23059/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.zoom.com/en/trust/security-bulletin/ZSB-23059/" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-426" } ], "source": "security@zoom.us", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:windows:*:*", "matchCriteriaId": "B7FE4BA5-8B53-4041-A006-9B4E44398A35", "versionEndExcluding": "5.14.7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper input validation in Zoom Desktop Client for Windows before 5.14.7 may allow an unauthenticated user to enable an escalation of privilege via network access." } ], "id": "CVE-2023-39216", "lastModified": "2024-11-21T08:14:56.073", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.6, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 6.0, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-08-08T18:15:23.657", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-80" } ], "source": "security@zoom.us", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:windows:*:*", "matchCriteriaId": "7BEEBBF1-8759-4ED0-912F-29176263A1E3", "versionEndExcluding": "5.14.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Untrusted search path in the installer for Zoom Desktop Client for Windows before 5.14.5 may allow an authenticated user to enable an escalation of privilege via local access." }, { "lang": "es", "value": "Una ruta de b\u00fasqueda no fiable en el instalador de Zoom Desktop Client para Windows anterior a 5.14.5 puede permitir que un usuario autenticado habilite una escalada de privilegios mediante acceso local." } ], "id": "CVE-2023-36540", "lastModified": "2024-11-21T08:09:53.973", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:L", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 4.7, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-08-08T18:15:14.293", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-426" } ], "source": "security@zoom.us", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-426" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:android:*:*", "matchCriteriaId": "FC3F07BF-C1ED-4CF9-B80E-B4373C97ED66", "versionEndExcluding": "5.14.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:ipad_os:*:*", "matchCriteriaId": "436C54EE-B52B-4F58-8883-E9D19501C08A", "versionEndExcluding": "5.14.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:macos:*:*", "matchCriteriaId": "E041B2BA-CDF0-462A-95CD-8F23D8804A61", "versionEndExcluding": "5.14.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:windows:*:*", "matchCriteriaId": "72486794-B1B9-4035-BF0F-7BF9E9298CD4", "versionEndExcluding": "5.14.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:virtual_desktop_infrastructure:*:*:*:*:*:*:*:*", "matchCriteriaId": "D94CAE4E-F680-4E96-AAFB-FC53B695F210", "versionEndExcluding": "5.14.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:android:*:*", "matchCriteriaId": "54090A11-AAB6-4796-9B61-84E6F8BD4471", "versionEndExcluding": "5.14.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "33C337B6-2098-4B95-8BDA-8FA009540E25", "versionEndExcluding": "5.14.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:linux:*:*", "matchCriteriaId": "C48C0F49-74C1-4E81-81CC-08928A3F8853", "versionEndExcluding": "5.14.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:macos:*:*", "matchCriteriaId": "7241B980-9BFE-4675-852C-3C3515AA1874", "versionEndExcluding": "5.14.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:windows:*:*", "matchCriteriaId": "7BEEBBF1-8759-4ED0-912F-29176263A1E3", "versionEndExcluding": "5.14.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in Zoom Clients before 5.14.5 may allow an unauthenticated user to enable a denial of service via network access." }, { "lang": "es", "value": "El desbordamiento del b\u00fafer en los clientes Zoom anteriores a la versi\u00f3n 5.14.5 puede permitir a un usuario no autenticado activar una denegaci\u00f3n de servicio a trav\u00e9s del acceso a la red. " } ], "id": "CVE-2023-36532", "lastModified": "2024-11-21T08:09:52.900", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-08-08T18:15:13.937", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-122" } ], "source": "security@zoom.us", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:linux:*:*", "matchCriteriaId": "6BF4E5E2-D96D-4B1E-AF50-C40B11116026", "versionEndExcluding": "2.0.115900.1201", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the ZoomLauncher binary in the Zoom client for Linux before 2.0.115900.1201 allows remote attackers to execute arbitrary code by leveraging the zoommtg:// scheme handler." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en pila en el binario ZoomLauncher del cliente Zoom para Linux en versiones anteriores a la 2.0.115900.1201 permite que atacantes remotos ejecuten c\u00f3digo arbitrario aprovechando el controlador de esquemas zoommtg://." } ], "id": "CVE-2017-15048", "lastModified": "2024-11-21T03:14:00.420", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-12-19T15:29:00.243", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/145452/Zoom-Linux-Client-2.0.106600.0904-Buffer-Overflow.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2017/Dec/46" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/convisoappsec/advisories/blob/master/2017/CONVISO-17-002.txt" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/43355/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/145452/Zoom-Linux-Client-2.0.106600.0904-Buffer-Overflow.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2017/Dec/46" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/convisoappsec/advisories/blob/master/2017/CONVISO-17-002.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/43355/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vendor | Product | Version | |
---|---|---|---|
zoom | virtual_desktop_infrastructure | * | |
zoom | zoom | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:virtual_desktop_infrastructure:*:*:*:*:*:*:*:*", "matchCriteriaId": "08933DED-744E-4F1A-A3D8-A68027580BAE", "versionEndExcluding": "5.15.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:windows:*:*", "matchCriteriaId": "AF2002E9-CEC6-4D38-83E4-7F8D2DE59806", "versionEndExcluding": "5.15.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper neutralization of special elements in Zoom Desktop Client for Windows and Zoom VDI Client before 5.15.2 may allow an unauthenticated user to enable an escalation of privilege via network access." } ], "id": "CVE-2023-39213", "lastModified": "2024-11-21T08:14:55.670", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.6, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 6.0, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-08-08T22:15:10.657", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-176" } ], "source": "security@zoom.us", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-74" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Vendor | Product | Version | |
---|---|---|---|
zoom | meetings | 5.15.0 | |
zoom | meetings | 5.15.0 | |
zoom | meetings | 5.15.0 | |
zoom | meetings | 5.15.1 | |
zoom | rooms | 5.15.0 | |
zoom | rooms | 5.15.0 | |
zoom | rooms | 5.15.0 | |
zoom | video_software_development_kit | 1.8.0 | |
zoom | zoom | 5.15.0 | |
zoom | zoom | 5.15.0 | |
zoom | zoom | 5.15.0 | |
zoom | zoom | 5.15.0 | |
zoom | zoom | 5.15.0 | |
zoom | zoom | 5.15.1 | |
zoom | poly_ccx_700_firmware | 5.15.0 | |
zoom | poly_ccx_700 | - | |
zoom | poly_ccx_600_firmware | 5.15.0 | |
zoom | poly_ccx_600 | - | |
zoom | yealink_vp59_firmware | 5.15.0 | |
zoom | yealink_vp59 | - | |
zoom | yealink_mp54_firmware | 5.15.0 | |
zoom | yealink_mp54 | - | |
zoom | yealink_mp56_firmware | 5.15.0 | |
zoom | yealink_mp56 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:meetings:5.15.0:*:*:*:*:android:*:*", "matchCriteriaId": "B19B33AC-0C62-48B8-974F-EBB94700432E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meetings:5.15.0:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "64EC33E5-F6E4-4845-B181-52DEC0E707BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meetings:5.15.0:*:*:*:*:macos:*:*", "matchCriteriaId": "F566F4A2-7A6F-4ECC-BD73-1F63AE4030B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meetings:5.15.1:*:*:*:*:windows:*:*", "matchCriteriaId": "E3E84645-EF69-4A61-B946-5DEEDD27A85E", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:5.15.0:*:*:*:*:ipad_os:*:*", "matchCriteriaId": "1735FAF3-E7B4-4615-92AD-5BA3399F6D55", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:5.15.0:*:*:*:*:macos:*:*", "matchCriteriaId": "2FFA4C37-4EFB-42F5-98BE-811F413113F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:5.15.0:*:*:*:*:windows:*:*", "matchCriteriaId": "ABB880FF-8853-45AE-818A-23CECB48E030", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:video_software_development_kit:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "84A39B46-A23B-4194-BDBF-16C337ADD1D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:5.15.0:*:*:*:*:android:*:*", "matchCriteriaId": "A47C1AC4-3092-41BE-8BB3-BABCD2ADC350", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:5.15.0:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "F6FC3EA3-DAD3-4D9E-8EF3-5CAC1A54EE45", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:5.15.0:*:*:*:*:linux:*:*", "matchCriteriaId": "502FC5A5-08CE-464F-A39E-FB16476F7B02", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:5.15.0:*:*:*:*:macos:*:*", "matchCriteriaId": "8AB43228-B469-46D9-BE1E-F7BCCC777F34", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:5.15.0:*:*:*:*:windows:*:*", "matchCriteriaId": "36AA507D-1B5D-42A3-A0BD-0D5FAA6AE3AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:5.15.1:*:*:*:*:windows:*:*", "matchCriteriaId": "E7777FBA-8B77-430F-8B64-AFB14E517179", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zoom:poly_ccx_700_firmware:5.15.0:*:*:*:*:*:*:*", "matchCriteriaId": "EEC1BF64-379E-4623-9F5F-EC37D9AE8928", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zoom:poly_ccx_700:-:*:*:*:*:*:*:*", "matchCriteriaId": "27D5E538-97CB-4F05-B8FC-AC6497425E78", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zoom:poly_ccx_600_firmware:5.15.0:*:*:*:*:*:*:*", "matchCriteriaId": "9E12A046-159E-4E45-954F-57A0C43938F4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zoom:poly_ccx_600:-:*:*:*:*:*:*:*", "matchCriteriaId": "A85D6BC1-E736-487F-8C02-C54B49F7C8B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zoom:yealink_vp59_firmware:5.15.0:*:*:*:*:*:*:*", "matchCriteriaId": "CE053959-5DE3-4954-8FD5-7D15FA77BC77", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zoom:yealink_vp59:-:*:*:*:*:*:*:*", "matchCriteriaId": "C661E9DF-1D17-408A-95D9-DE5D941EC93B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zoom:yealink_mp54_firmware:5.15.0:*:*:*:*:*:*:*", "matchCriteriaId": "1A33909C-EB63-4234-A2B5-6F6D39EB8ACB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zoom:yealink_mp54:-:*:*:*:*:*:*:*", "matchCriteriaId": "1F942425-D356-47BA-95A6-61E1FD5029F4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:zoom:yealink_mp56_firmware:5.15.0:*:*:*:*:*:*:*", "matchCriteriaId": "31C96F0F-E282-427B-92C7-225252952F3E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:zoom:yealink_mp56:-:*:*:*:*:*:*:*", "matchCriteriaId": "B5097727-AE57-436F-B7EF-E93BD96B2E23", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Exposure of information intended to be encrypted by some Zoom clients may lead to disclosure of sensitive information." }, { "lang": "es", "value": "La exposici\u00f3n de informaci\u00f3n destinada a ser cifrada por algunos clientes Zoom puede dar lugar a la divulgaci\u00f3n de informaci\u00f3n sensible." } ], "id": "CVE-2023-36539", "lastModified": "2024-11-21T08:09:53.833", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 3.6, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-06-30T03:15:09.747", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" }, { "lang": "en", "value": "CWE-325" } ], "source": "security@zoom.us", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-326" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
vulnreport@tenable.com | https://www.tenable.com/security/research/tra-2018-40 | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.tenable.com/security/research/tra-2018-40 | Exploit, Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:linux:*:*", "matchCriteriaId": "BE8776DC-C5C4-4B38-837C-E33504BDB193", "versionEndIncluding": "2.4.129780.0915", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:mac_os_x:*:*", "matchCriteriaId": "EBF7AA2C-A532-416B-8B3D-61B9720111A8", "versionEndExcluding": "4.1.34801.1116", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:windows:*:*", "matchCriteriaId": "E42C7697-E707-4F82-9512-4CD4E9170694", "versionEndExcluding": "4.1.34814.1119", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Zoom clients on Windows (before version 4.1.34814.1119), Mac OS (before version 4.1.34801.1116), and Linux (2.4.129780.0915 and below) are vulnerable to unauthorized message processing. A remote unauthenticated attacker can spoof UDP messages from a meeting attendee or Zoom server in order to invoke functionality in the target client. This allows the attacker to remove attendees from meetings, spoof messages from users, or hijack shared screens." }, { "lang": "es", "value": "Los clientes de Zoom en Windows (antes de la versi\u00f3n 4.1.34814.1119), Mac OS (antes de la versi\u00f3n 4.1.34801.1116) y Linux (2.4.129780.0915 y anteriores) son vulnerables al procesamiento no autorizado de im\u00e1genes. Un atacante remoto no autenticado puede suplantar los mensajes UDP de un asistente a la reuni\u00f3n o de un servidor de Zoom para invocar funcionalidades en el cliente objetivo. Esto permite que el atacante elimine asistentes de las reuniones, suplante mensajes de los usuarios o secuestre pantallas compartidas." } ], "id": "CVE-2018-15715", "lastModified": "2024-11-21T03:51:19.787", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-11-30T20:29:00.223", "references": [ { "source": "vulnreport@tenable.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.tenable.com/security/research/tra-2018-40" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.tenable.com/security/research/tra-2018-40" } ], "sourceIdentifier": "vulnreport@tenable.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-290" } ], "source": "vulnreport@tenable.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:macos:*:*", "matchCriteriaId": "6B3D7B50-B13B-45D3-AE2C-7EBB1DE30FA4", "versionEndExcluding": "5.14.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:windows:*:*", "matchCriteriaId": "B2DE0D4A-F97E-41D3-9906-427BEFFBDB8F", "versionEndExcluding": "5.14.10", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Exposure of resource to wrong sphere in Zoom for Windows and Zoom for MacOS clients before 5.14.10 may allow an authenticated user to potentially enable information disclosure via network access. " } ], "id": "CVE-2023-34114", "lastModified": "2024-11-21T08:06:34.590", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 4.0, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-06-13T19:15:09.427", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-668" } ], "source": "security@zoom.us", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-668" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:meetings:*:*:*:*:*:android:*:*", "matchCriteriaId": "249D7C05-850F-4BED-BE1B-864B3A555DC5", "versionEndExcluding": "5.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meetings:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "CF877945-AEBB-4347-B45C-DC5CF711EAC0", "versionEndExcluding": "5.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meetings:*:*:*:*:*:linux:*:*", "matchCriteriaId": "E7C90882-B6EB-476E-B8C8-9CA9D2C86328", "versionEndExcluding": "5.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meetings:*:*:*:*:*:macos:*:*", "matchCriteriaId": "C00191F0-BCF9-4200-8953-B1DD1E0DBA3F", "versionEndExcluding": "5.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meetings:*:*:*:*:*:windows:*:*", "matchCriteriaId": "E80CFF3B-0BF6-4EF4-878B-B037B5DF1BC5", "versionEndExcluding": "5.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:android:*:*", "matchCriteriaId": "12D81D70-FA29-4921-9A20-BE8DC596F6AE", "versionEndExcluding": "5.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:ipad_os:*:*", "matchCriteriaId": "141007D5-4A8B-48C3-8BFB-EAF8BC3EF905", "versionEndExcluding": "5.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:macos:*:*", "matchCriteriaId": "3D39B6BA-D4BC-4502-8867-D5A5441D3196", "versionEndExcluding": "5.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:windows:*:*", "matchCriteriaId": "62689640-F0DA-4FBA-83A9-AA29843B6E57", "versionEndExcluding": "5.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:virtual_desktop_infrastructure:*:*:*:*:*:*:*:*", "matchCriteriaId": "4D26E2D3-9148-44AA-8AF0-A3E58704F532", "versionEndExcluding": "5.14.13", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:virtual_desktop_infrastructure:*:*:*:*:*:*:*:*", "matchCriteriaId": "C3B28CE5-ABB5-43C4-8BB4-133050E0821E", "versionEndExcluding": "5.15.11", "versionStartIncluding": "5.15.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:android:*:*", "matchCriteriaId": "A454D523-527C-4910-8474-EB4CDFFE7BF6", "versionEndExcluding": "5.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "BE96C026-8B39-4509-BA4F-AC224918DC8F", "versionEndExcluding": "5.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:linux:*:*", "matchCriteriaId": "7EB1DC6F-6270-40C4-804F-7EEC18A62FE8", "versionEndExcluding": "5.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:macos:*:*", "matchCriteriaId": "E055EB88-5A25-4348-AAEA-5A25496E5E64", "versionEndExcluding": "5.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:windows:*:*", "matchCriteriaId": "1BF6E442-FE5C-46AF-AE37-4D5A9AB56A3D", "versionEndExcluding": "5.16.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper authorization in some Zoom clients may allow an authorized user to conduct an escalation of privilege via network access." }, { "lang": "es", "value": "La autorizaci\u00f3n inadecuada en algunos clientes de Zoom puede permitir que un usuario autorizado realice una escalada de privilegios a trav\u00e9s del acceso a la red." } ], "id": "CVE-2023-43582", "lastModified": "2024-11-21T08:24:26.447", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 3.4, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-11-15T00:15:08.673", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-939" } ], "source": "security@zoom.us", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:meetings:*:*:*:*:*:android:*:*", "matchCriteriaId": "249D7C05-850F-4BED-BE1B-864B3A555DC5", "versionEndExcluding": "5.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meetings:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "CF877945-AEBB-4347-B45C-DC5CF711EAC0", "versionEndExcluding": "5.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meetings:*:*:*:*:*:linux:*:*", "matchCriteriaId": "E7C90882-B6EB-476E-B8C8-9CA9D2C86328", "versionEndExcluding": "5.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meetings:*:*:*:*:*:macos:*:*", "matchCriteriaId": "C00191F0-BCF9-4200-8953-B1DD1E0DBA3F", "versionEndExcluding": "5.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meetings:*:*:*:*:*:windows:*:*", "matchCriteriaId": "E80CFF3B-0BF6-4EF4-878B-B037B5DF1BC5", "versionEndExcluding": "5.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:android:*:*", "matchCriteriaId": "12D81D70-FA29-4921-9A20-BE8DC596F6AE", "versionEndExcluding": "5.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:ipad_os:*:*", "matchCriteriaId": "141007D5-4A8B-48C3-8BFB-EAF8BC3EF905", "versionEndExcluding": "5.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:macos:*:*", "matchCriteriaId": "3D39B6BA-D4BC-4502-8867-D5A5441D3196", "versionEndExcluding": "5.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:windows:*:*", "matchCriteriaId": "62689640-F0DA-4FBA-83A9-AA29843B6E57", "versionEndExcluding": "5.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:virtual_desktop_infrastructure:*:*:*:*:*:*:*:*", "matchCriteriaId": "4D26E2D3-9148-44AA-8AF0-A3E58704F532", "versionEndExcluding": "5.14.13", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:virtual_desktop_infrastructure:*:*:*:*:*:*:*:*", "matchCriteriaId": "C3B28CE5-ABB5-43C4-8BB4-133050E0821E", "versionEndExcluding": "5.15.11", "versionStartIncluding": "5.15.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:android:*:*", "matchCriteriaId": "A454D523-527C-4910-8474-EB4CDFFE7BF6", "versionEndExcluding": "5.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "BE96C026-8B39-4509-BA4F-AC224918DC8F", "versionEndExcluding": "5.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:linux:*:*", "matchCriteriaId": "7EB1DC6F-6270-40C4-804F-7EEC18A62FE8", "versionEndExcluding": "5.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:macos:*:*", "matchCriteriaId": "E055EB88-5A25-4348-AAEA-5A25496E5E64", "versionEndExcluding": "5.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:windows:*:*", "matchCriteriaId": "1BF6E442-FE5C-46AF-AE37-4D5A9AB56A3D", "versionEndExcluding": "5.16.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cryptographic issues with In-Meeting Chat for some Zoom clients may allow a privileged user to conduct an information disclosure via network access." }, { "lang": "es", "value": "Los problemas criptogr\u00e1ficos con el chat durante la reuni\u00f3n para algunos clientes de Zoom pueden permitir que un usuario privilegiado realice una divulgaci\u00f3n de informaci\u00f3n a trav\u00e9s del acceso a la red." } ], "id": "CVE-2023-39199", "lastModified": "2024-11-21T08:14:54.020", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 3.6, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-11-14T23:15:08.090", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-325" } ], "source": "security@zoom.us", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Vendor | Product | Version | |
---|---|---|---|
zoom | meeting_software_development_kit | * | |
zoom | meeting_software_development_kit | * | |
zoom | video_software_development_kit | * | |
zoom | zoom | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:android:*:*", "matchCriteriaId": "E725B855-C1FD-40B0-B5DD-164CB83D0F53", "versionEndExcluding": "5.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "921ABABB-33A6-4B83-844B-236C549B48CF", "versionEndExcluding": "5.16.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "0141CCFA-C930-4649-8894-4B093AE63848", "versionEndExcluding": "5.16.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "C2BF4129-CA54-4ECB-9A6B-EC28445233DF", "versionEndExcluding": "5.16.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper access control in Zoom Mobile App for iOS and Zoom SDKs for iOS before version 5.16.5 may allow an authenticated user to conduct a disclosure of information via network access." }, { "lang": "es", "value": "Un control de acceso inadecuado en la aplicaci\u00f3n Zoom Mobile para iOS y los SDK de Zoom para iOS anteriores a la versi\u00f3n 5.16.5 puede permitir que un usuario autenticado realice una divulgaci\u00f3n de informaci\u00f3n a trav\u00e9s del acceso a la red." } ], "id": "CVE-2023-43585", "lastModified": "2024-11-21T08:24:26.730", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 4.2, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-12-13T23:15:07.463", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://www.zoom.com/en/trust/security-bulletin/ZSB-23058/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.zoom.com/en/trust/security-bulletin/ZSB-23058/" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-449" } ], "source": "security@zoom.us", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
4.9 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
Vendor | Product | Version | |
---|---|---|---|
zoom | meeting_software_development_kit | * | |
zoom | meeting_software_development_kit | * | |
zoom | video_software_development_kit | * | |
zoom | video_software_development_kit | * | |
zoom | zoom | * | |
zoom | zoom | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:android:*:*", "matchCriteriaId": "E725B855-C1FD-40B0-B5DD-164CB83D0F53", "versionEndExcluding": "5.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "D09B037A-A36E-480E-A180-A2FDBB0CE130", "versionEndExcluding": "5.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:android:*:*", "matchCriteriaId": "76ECB323-FA2E-4C2C-9949-40A068BB46C1", "versionEndExcluding": "5.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "8BB16085-BEA2-4FCF-AA22-F6DD44A2E8DF", "versionEndExcluding": "5.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:android:*:*", "matchCriteriaId": "A454D523-527C-4910-8474-EB4CDFFE7BF6", "versionEndExcluding": "5.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "BE96C026-8B39-4509-BA4F-AC224918DC8F", "versionEndExcluding": "5.16.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cryptographic issues Zoom Mobile App for Android, Zoom Mobile App for iOS, and Zoom SDKs for Android and iOS before version 5.16.0 may allow a privileged user to conduct a disclosure of information via network access." }, { "lang": "es", "value": "Los problemas criptogr\u00e1ficos de la aplicaci\u00f3n Zoom Mobile para Android, la aplicaci\u00f3n Zoom Mobile para iOS y los SDK de Zoom para Android e iOS anteriores a la versi\u00f3n 5.16.0 pueden permitir que un usuario privilegiado realice una divulgaci\u00f3n de informaci\u00f3n a trav\u00e9s del acceso a la red." } ], "id": "CVE-2023-43583", "lastModified": "2024-11-21T08:24:26.607", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 3.6, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-12-13T23:15:07.270", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://www.zoom.com/en/trust/security-bulletin/ZSB-23056/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.zoom.com/en/trust/security-bulletin/ZSB-23056/" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-798" } ], "source": "security@zoom.us", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:*:*:*", "matchCriteriaId": "8AE7F07C-3FDD-4D2A-92E6-A9648C83B016", "versionEndIncluding": "5.5.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Zoom through 5.5.4 sometimes allows attackers to read private information on a participant\u0027s screen, even though the participant never attempted to share the private part of their screen. When a user shares a specific application window via the Share Screen functionality, other meeting participants can briefly see contents of other application windows that were explicitly not shared. The contents of these other windows can (for instance) be seen for a short period of time when they overlay the shared window and get into focus. (An attacker can, of course, use a separate screen-recorder application, unsupported by Zoom, to save all such contents for later replays and analysis.) Depending on the unintentionally shared data, this short exposure of screen contents may be a more or less severe security issue." }, { "lang": "es", "value": "Zoom versiones hasta 5.5.4, a veces permite a atacantes leer informaci\u00f3n privada en la pantalla de un participante, aunque el participante nunca intent\u00f3 compartir la parte privada de su pantalla.\u0026#xa0;Cuando un usuario comparte una ventana de aplicaci\u00f3n espec\u00edfica por medio de la funcionalidad Share Screen, otros participantes de la reuni\u00f3n pueden visualizar brevemente el contenido de otras ventanas de la aplicaci\u00f3n que no se compartieron expl\u00edcitamente.\u0026#xa0;El contenido de estas otras ventanas puede (por ejemplo) verse durante un corto per\u00edodo de tiempo cuando se superponen a la ventana compartida y se enfocan.\u0026#xa0;(Un atacante puede, por supuesto, usar una aplicaci\u00f3n de grabaci\u00f3n de pantalla separada, no compatible con Zoom, para guardar todos esos contenidos para posteriores repeticiones y an\u00e1lisis). Dependiendo de los datos compartidos involuntariamente, esta breve exposici\u00f3n de los contenidos de la pantalla puede ser un problema de seguridad m\u00e1s o menos grave" } ], "id": "CVE-2021-28133", "lastModified": "2024-11-21T05:59:09.147", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-03-18T14:15:14.007", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://packetstormsecurity.com/files/161897/Zoom-5.4.3-54779.1115-5.5.4-13142.0301-Information-Disclosure.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/Mar/48" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://thehackernews.com/2021/03/new-zoom-screen-sharing-bug-lets-other.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-044.txt" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.syss.de/pentest-blog/syss-2020-044-sicherheitsproblem-in-screen-sharing-funktionalitaet-von-zoom-cve-2021-28133" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.youtube.com/watch?v=SonmmgQlLzg" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://zoom.us/trust/security/security-bulletin" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://packetstormsecurity.com/files/161897/Zoom-5.4.3-54779.1115-5.5.4-13142.0301-Information-Disclosure.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/Mar/48" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://thehackernews.com/2021/03/new-zoom-screen-sharing-bug-lets-other.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-044.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.syss.de/pentest-blog/syss-2020-044-sicherheitsproblem-in-screen-sharing-funktionalitaet-von-zoom-cve-2021-28133" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.youtube.com/watch?v=SonmmgQlLzg" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://zoom.us/trust/security/security-bulletin" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:*:*:*", "matchCriteriaId": "98A563A0-DD3D-420D-8D3D-06F57E441F6A", "versionEndExcluding": "5.13.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Zoom clients before version 5.13.5 contain a STUN parsing vulnerability. A malicious actor could send specially crafted UDP traffic to a victim Zoom client to remotely cause the client to crash, causing a denial of service." } ], "id": "CVE-2023-22882", "lastModified": "2024-11-21T07:45:34.450", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-03-16T21:15:13.040", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "security@zoom.us", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Vendor | Product | Version | |
---|---|---|---|
zoom | meetings | * | |
zoom | meetings | * | |
zoom | meetings | * | |
zoom | meetings | * | |
zoom | meetings | * | |
zoom | rooms | * | |
zoom | rooms | * | |
zoom | rooms | * | |
zoom | rooms | * | |
zoom | video_software_development_kit | * | |
zoom | video_software_development_kit | * | |
zoom | video_software_development_kit | * | |
zoom | video_software_development_kit | * | |
zoom | video_software_development_kit | * | |
zoom | virtual_desktop_infrastructure | * | |
zoom | virtual_desktop_infrastructure | * | |
zoom | zoom | * | |
zoom | zoom | * | |
zoom | zoom | * | |
zoom | zoom | * | |
zoom | zoom | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:meetings:*:*:*:*:*:android:*:*", "matchCriteriaId": "249D7C05-850F-4BED-BE1B-864B3A555DC5", "versionEndExcluding": "5.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meetings:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "CF877945-AEBB-4347-B45C-DC5CF711EAC0", "versionEndExcluding": "5.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meetings:*:*:*:*:*:linux:*:*", "matchCriteriaId": "E7C90882-B6EB-476E-B8C8-9CA9D2C86328", "versionEndExcluding": "5.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meetings:*:*:*:*:*:macos:*:*", "matchCriteriaId": "C00191F0-BCF9-4200-8953-B1DD1E0DBA3F", "versionEndExcluding": "5.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meetings:*:*:*:*:*:windows:*:*", "matchCriteriaId": "E80CFF3B-0BF6-4EF4-878B-B037B5DF1BC5", "versionEndExcluding": "5.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:android:*:*", "matchCriteriaId": "12D81D70-FA29-4921-9A20-BE8DC596F6AE", "versionEndExcluding": "5.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:ipad_os:*:*", "matchCriteriaId": "141007D5-4A8B-48C3-8BFB-EAF8BC3EF905", "versionEndExcluding": "5.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:macos:*:*", "matchCriteriaId": "3D39B6BA-D4BC-4502-8867-D5A5441D3196", "versionEndExcluding": "5.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:windows:*:*", "matchCriteriaId": "62689640-F0DA-4FBA-83A9-AA29843B6E57", "versionEndExcluding": "5.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:android:*:*", "matchCriteriaId": "440B9710-9B66-4F17-A4EE-C1D11DF4DC76", "versionEndExcluding": "1.9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "B3F99428-4438-47DA-BD2D-FF61BF1CC736", "versionEndExcluding": "1.9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:linux:*:*", "matchCriteriaId": "392358DF-EC53-4538-A361-F467B8DFEE8B", "versionEndExcluding": "1.9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:macos:*:*", "matchCriteriaId": "1E1A90A2-8B2E-481F-95D6-FB9E85B951CD", "versionEndExcluding": "1.9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:windows:*:*", "matchCriteriaId": "33188B54-F6E1-4556-8A90-9DD7384AF299", "versionEndExcluding": "1.9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:virtual_desktop_infrastructure:*:*:*:*:*:*:*:*", "matchCriteriaId": "4D26E2D3-9148-44AA-8AF0-A3E58704F532", "versionEndExcluding": "5.14.13", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:virtual_desktop_infrastructure:*:*:*:*:*:*:*:*", "matchCriteriaId": "C3B28CE5-ABB5-43C4-8BB4-133050E0821E", "versionEndExcluding": "5.15.11", "versionStartIncluding": "5.15.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:android:*:*", "matchCriteriaId": "A454D523-527C-4910-8474-EB4CDFFE7BF6", "versionEndExcluding": "5.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "BE96C026-8B39-4509-BA4F-AC224918DC8F", "versionEndExcluding": "5.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:linux:*:*", "matchCriteriaId": "7EB1DC6F-6270-40C4-804F-7EEC18A62FE8", "versionEndExcluding": "5.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:macos:*:*", "matchCriteriaId": "E055EB88-5A25-4348-AAEA-5A25496E5E64", "versionEndExcluding": "5.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:windows:*:*", "matchCriteriaId": "1BF6E442-FE5C-46AF-AE37-4D5A9AB56A3D", "versionEndExcluding": "5.16.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in some Zoom clients may allow an unauthenticated user to conduct a denial of service via network access." }, { "lang": "es", "value": "El desbordamiento del b\u00fafer en algunos clientes de Zoom puede permitir que un usuario no autenticado realice una denegaci\u00f3n de servicio a trav\u00e9s del acceso a la red." } ], "id": "CVE-2023-39206", "lastModified": "2024-11-21T08:14:54.847", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 1.4, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-11-14T23:15:09.073", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-120" } ], "source": "security@zoom.us", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-120" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vendor | Product | Version | |
---|---|---|---|
zoom | meeting_software_development_kit | * | |
zoom | rooms | * | |
zoom | vdi_windows_meeting_clients | * | |
zoom | vdi_windows_meeting_clients | * | |
zoom | vdi_windows_meeting_clients | * | |
zoom | zoom | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:windows:*:*", "matchCriteriaId": "B72243E4-AFF7-4A69-934A-1170A6EDAE0F", "versionEndExcluding": "5.16.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:windows:*:*", "matchCriteriaId": "9D60A59A-2E09-48C6-82F6-995B7ADB330A", "versionEndExcluding": "5.17.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:vdi_windows_meeting_clients:*:*:*:*:*:windows:*:*", "matchCriteriaId": "DEC61EA8-8A9D-4E36-9B46-2B45ED1C5DB8", "versionEndExcluding": "5.14.14", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:vdi_windows_meeting_clients:*:*:*:*:*:windows:*:*", "matchCriteriaId": "390DFFB5-7BEA-41F2-B2E1-F0FED3766C1E", "versionEndExcluding": "5.15.12", "versionStartExcluding": "5.14.14", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:vdi_windows_meeting_clients:*:*:*:*:*:windows:*:*", "matchCriteriaId": "8B90CC0C-8000-44E1-8AA1-5E67081ECD2E", "versionEndExcluding": "5.16.10", "versionStartExcluding": "5.15.12", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:windows:*:*", "matchCriteriaId": "19B08EB3-7EBF-416F-91B9-4600E47567F7", "versionEndExcluding": "5.16.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper input validation in Zoom Desktop Client for Windows, Zoom VDI Client for Windows, and Zoom Meeting SDK for Windows may allow an unauthenticated user to conduct an escalation of privilege via network access." }, { "lang": "es", "value": "Una validaci\u00f3n de entrada incorrecta en Zoom Desktop Client para Windows, Zoom VDI Client para Windows y Zoom Meeting SDK para Windows puede permitir que un usuario no autenticado realice una escalada de privilegios a trav\u00e9s del acceso a la red." } ], "id": "CVE-2024-24691", "lastModified": "2024-11-21T08:59:30.850", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.6, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 6.0, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-02-14T00:15:47.200", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://www.zoom.com/en/trust/security-bulletin/ZSB-24008/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.zoom.com/en/trust/security-bulletin/ZSB-24008/" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-176" } ], "source": "security@zoom.us", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:virtual_desktop_infrastructure:*:*:*:*:*:*:*:*", "matchCriteriaId": "364E9CFF-C55A-44B1-BF4A-AEDAB08BE452", "versionEndExcluding": "5.10.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:android:*:*", "matchCriteriaId": "C059A8B5-9214-43F8-B53A-3D9DDADF49F0", "versionEndExcluding": "5.11.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "5A40DBBC-FE5D-4184-A316-BED132076283", "versionEndExcluding": "5.11.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:linux:*:*", "matchCriteriaId": "98739FA0-6CF7-41F6-92D2-727AD8E6EFF9", "versionEndExcluding": "5.11.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:macos:*:*", "matchCriteriaId": "160035A8-03A0-42DD-AFD1-49DC1A8731D1", "versionEndExcluding": "5.11.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:windows:*:*", "matchCriteriaId": "240C9E30-E4C6-46D0-998C-37886335B220", "versionEndExcluding": "5.11.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Zoom Client for Meetings (for Android, iOS, Linux, macOS, and Windows) before version 5.11.0 are susceptible to a URL parsing vulnerability. If a malicious Zoom meeting URL is opened, the malicious link may direct the user to connect to an arbitrary network address, leading to additional attacks including the potential for remote code execution through launching executables from arbitrary paths." }, { "lang": "es", "value": "Zoom Client for Meetings (para Android, iOS, Linux, macOS y Windows) versiones anteriores a 5.11.0, es susceptible de una vulnerabilidad de an\u00e1lisis de URL. Si es abierta una URL de reuni\u00f3n de Zoom maliciosa, el enlace malicioso puede dirigir al usuario a conectarse a una direcci\u00f3n de red arbitraria, lo que conlleva ataques adicionales, incluyendo la posibilidad de ejecuci\u00f3n de c\u00f3digo remoto mediante el lanzamiento de ejecutables desde rutas arbitrarias" } ], "id": "CVE-2022-28755", "lastModified": "2024-11-21T06:57:52.257", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.6, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 6.0, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-08-11T15:15:12.357", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "security@zoom.us", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-601" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:*:*:*", "matchCriteriaId": "98A563A0-DD3D-420D-8D3D-06F57E441F6A", "versionEndExcluding": "5.13.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Zoom clients before version 5.13.5 contain a STUN parsing vulnerability. A malicious actor could send specially crafted UDP traffic to a victim Zoom client to remotely cause the client to crash, causing a denial of service." } ], "id": "CVE-2023-22881", "lastModified": "2024-11-21T07:45:34.320", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-03-16T21:15:12.970", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "security@zoom.us", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:macos:*:*", "matchCriteriaId": "D7CC6BDB-46B2-4A95-985C-A7F0674047F4", "versionEndExcluding": "4.4.53932.0709", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Zoom Client before 4.4.53932.0709 on macOS allows remote code execution, a different vulnerability than CVE-2019-13450. If the ZoomOpener daemon (aka the hidden web server) is running, but the Zoom Client is not installed or can\u0027t be opened, an attacker can remotely execute code with a maliciously crafted launch URL. NOTE: ZoomOpener is removed by the Apple Malware Removal Tool (MRT) if this tool is enabled and has the 2019-07-10 MRTConfigData." }, { "lang": "es", "value": "El Cliente Zoom anterior a versi\u00f3n 4.4.2 en macOS, permite la ejecuci\u00f3n de c\u00f3digo remota, una vulnerabilidad diferente de CVE-2019-13450. Si el demonio ZoomOpener (tambi\u00e9n conocido como el servidor web hidden) se ejecuta, pero el Cliente Zoom no est\u00e1 instalado o no se puede abrir, un atacante puede ejecutar el c\u00f3digo de remotamente con una URL de inicio maliciosamente dise\u00f1ada. NOTA: ZoomOpener es eliminada con la herramienta de eliminaci\u00f3n de malware de Apple (MRT) si esta herramienta est\u00e1 habilitada y tiene el MRTConfigData en 10-07-2019." } ], "id": "CVE-2019-13567", "lastModified": "2024-11-21T04:25:11.700", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-07-12T04:15:10.900", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://gist.github.com/wbowling/13f9f90365c171806b9ffba2c841026b" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://support.zoom.us/hc/en-us/articles/201361963-New-Updates-for-Mac-OS" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://twitter.com/JLLeitschuh/status/1149420685405708295" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://twitter.com/JLLeitschuh/status/1149422543658520578" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://twitter.com/riskybusiness/status/1149125147019767814" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://twitter.com/wcbowling/status/1149457231504498689" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://twitter.com/wcbowling/status/1166998107667619841" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://gist.github.com/wbowling/13f9f90365c171806b9ffba2c841026b" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://support.zoom.us/hc/en-us/articles/201361963-New-Updates-for-Mac-OS" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://twitter.com/JLLeitschuh/status/1149420685405708295" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://twitter.com/JLLeitschuh/status/1149422543658520578" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://twitter.com/riskybusiness/status/1149125147019767814" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://twitter.com/wcbowling/status/1149457231504498689" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://twitter.com/wcbowling/status/1166998107667619841" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Vendor | Product | Version | |
---|---|---|---|
zoom | meeting_sdk | * | |
zoom | rooms | * | |
zoom | vdi_windows_meeting_clients | * | |
zoom | vdi_windows_meeting_clients | * | |
zoom | vdi_windows_meeting_clients | * | |
zoom | zoom | * | |
zoom | zoom | * | |
zoom | zoom | * | |
zoom | zoom | * | |
zoom | zoom | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:meeting_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "7AF19578-CD2C-40F8-9A97-7979CB9091DC", "versionEndExcluding": "5.16.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:*:*:*", "matchCriteriaId": "61CCEE1E-F3C0-41EB-8DF2-4D3EA8600166", "versionEndExcluding": "5.17.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:vdi_windows_meeting_clients:*:*:*:*:*:windows:*:*", "matchCriteriaId": "B91935BE-F245-4ADD-A206-D318618BAA1D", "versionEndExcluding": "5.15.15", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:vdi_windows_meeting_clients:*:*:*:*:*:windows:*:*", "matchCriteriaId": "517DE939-52E8-4AA5-A987-F18931242DD1", "versionEndExcluding": "5.16.10", "versionStartExcluding": "5.15.15", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:vdi_windows_meeting_clients:*:*:*:*:*:windows:*:*", "matchCriteriaId": "5C5BD790-A2A7-4089-AF42-1FC13E0087D5", "versionEndExcluding": "5.17.5", "versionStartExcluding": "5.16.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:android:*:*", "matchCriteriaId": "F0EA451C-C4DC-48EF-A036-3EEA3E3ADD80", "versionEndExcluding": "5.16.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "C2BF4129-CA54-4ECB-9A6B-EC28445233DF", "versionEndExcluding": "5.16.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:linux:*:*", "matchCriteriaId": "AD4CD81C-1F22-45CA-8AB1-D6D59E819759", "versionEndExcluding": "5.16.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:macos:*:*", "matchCriteriaId": "BB9276FF-17D3-4FDB-91BB-2CE6E8BA61A0", "versionEndExcluding": "5.16.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:windows:*:*", "matchCriteriaId": "19B08EB3-7EBF-416F-91B9-4600E47567F7", "versionEndExcluding": "5.16.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Business logic error in some Zoom clients may allow an authenticated user to conduct information disclosure via network access.\n" }, { "lang": "es", "value": "Un error de l\u00f3gica empresarial en algunos clientes de Zoom puede permitir que un usuario autenticado realice la divulgaci\u00f3n de informaci\u00f3n a trav\u00e9s del acceso a la red." } ], "id": "CVE-2024-24699", "lastModified": "2024-11-21T08:59:32.053", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-02-14T00:15:48.150", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://www.zoom.com/en/trust/security-bulletin/ZSB-24006/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.zoom.com/en/trust/security-bulletin/ZSB-24006/" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:macos:*:*", "matchCriteriaId": "E607D9D5-AE32-4377-9AA5-9B44DC161882", "versionEndExcluding": "5.14.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Zoom for MacOSclients prior to 5.14.0 contain an improper access control vulnerability. A malicious user may be able to delete/replace Zoom Client files potentially causing a loss of integrity and availability to the Zoom Client." } ], "id": "CVE-2023-28600", "lastModified": "2024-11-21T07:55:38.720", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 1.0, "impactScore": 3.7, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.5, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-06-13T18:15:21.533", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-378" } ], "source": "security@zoom.us", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:mac_os_x:*:*", "matchCriteriaId": "7936A1CE-E312-4F24-85BC-A9DE7C6B96A8", "versionEndExcluding": "4.4.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Zoom Client before 4.4.2 on macOS, remote attackers can cause a denial of service (continual focus grabs) via a sequence of invalid launch?action=join\u0026confno= requests to localhost port 19421." }, { "lang": "es", "value": "En el Cliente Zoom anterior a versi\u00f3n 4.4.2 en macOS, los atacantes remotos pueden causar una denegaci\u00f3n de servicio (captura de enfoque continua) por medio de una secuencia de peticiones invalidas launch?action=join\u0026confno= en el puerto host local 19421." } ], "id": "CVE-2019-13449", "lastModified": "2024-11-21T04:24:55.440", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-07-09T06:15:10.257", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://assets.zoom.us/docs/pdf/Zoom+Response+Video-On+Vulnerability.pdf" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://blog.zoom.us/wordpress/2019/07/08/response-to-video-on-concern/" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://bugs.chromium.org/p/chromium/issues/detail?id=951540" }, { "source": "cve@mitre.org", "url": "https://medium.com/%40jonathan.leitschuh/zoom-zero-day-4-million-webcams-maybe-an-rce-just-get-them-to-visit-your-website-ac75c83f4ef5" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://twitter.com/zoom_us/status/1148710712241295361" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://assets.zoom.us/docs/pdf/Zoom+Response+Video-On+Vulnerability.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://blog.zoom.us/wordpress/2019/07/08/response-to-video-on-concern/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://bugs.chromium.org/p/chromium/issues/detail?id=951540" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://medium.com/%40jonathan.leitschuh/zoom-zero-day-4-million-webcams-maybe-an-rce-just-get-them-to-visit-your-website-ac75c83f4ef5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://twitter.com/zoom_us/status/1148710712241295361" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Vendor | Product | Version | |
---|---|---|---|
zoom | meetings | * | |
zoom | meetings | * | |
zoom | meetings | * | |
zoom | meetings | * | |
zoom | meetings | * | |
zoom | video_software_development_kit | * | |
zoom | video_software_development_kit | * | |
zoom | video_software_development_kit | * | |
zoom | video_software_development_kit | * | |
zoom | video_software_development_kit | * | |
zoom | virtual_desktop_infrastructure | * | |
zoom | virtual_desktop_infrastructure | * | |
zoom | zoom | * | |
zoom | zoom | * | |
zoom | zoom | * | |
zoom | zoom | * | |
zoom | zoom | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:meetings:*:*:*:*:*:android:*:*", "matchCriteriaId": "249D7C05-850F-4BED-BE1B-864B3A555DC5", "versionEndExcluding": "5.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meetings:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "CF877945-AEBB-4347-B45C-DC5CF711EAC0", "versionEndExcluding": "5.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meetings:*:*:*:*:*:linux:*:*", "matchCriteriaId": "E7C90882-B6EB-476E-B8C8-9CA9D2C86328", "versionEndExcluding": "5.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meetings:*:*:*:*:*:macos:*:*", "matchCriteriaId": "C00191F0-BCF9-4200-8953-B1DD1E0DBA3F", "versionEndExcluding": "5.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meetings:*:*:*:*:*:windows:*:*", "matchCriteriaId": "E80CFF3B-0BF6-4EF4-878B-B037B5DF1BC5", "versionEndExcluding": "5.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:android:*:*", "matchCriteriaId": "440B9710-9B66-4F17-A4EE-C1D11DF4DC76", "versionEndExcluding": "1.9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "B3F99428-4438-47DA-BD2D-FF61BF1CC736", "versionEndExcluding": "1.9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:linux:*:*", "matchCriteriaId": "392358DF-EC53-4538-A361-F467B8DFEE8B", "versionEndExcluding": "1.9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:macos:*:*", "matchCriteriaId": "1E1A90A2-8B2E-481F-95D6-FB9E85B951CD", "versionEndExcluding": "1.9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:windows:*:*", "matchCriteriaId": "33188B54-F6E1-4556-8A90-9DD7384AF299", "versionEndExcluding": "1.9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:virtual_desktop_infrastructure:*:*:*:*:*:*:*:*", "matchCriteriaId": "4D26E2D3-9148-44AA-8AF0-A3E58704F532", "versionEndExcluding": "5.14.13", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:virtual_desktop_infrastructure:*:*:*:*:*:*:*:*", "matchCriteriaId": "C3B28CE5-ABB5-43C4-8BB4-133050E0821E", "versionEndExcluding": "5.15.11", "versionStartIncluding": "5.15.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:android:*:*", "matchCriteriaId": "A454D523-527C-4910-8474-EB4CDFFE7BF6", "versionEndExcluding": "5.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "BE96C026-8B39-4509-BA4F-AC224918DC8F", "versionEndExcluding": "5.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:linux:*:*", "matchCriteriaId": "7EB1DC6F-6270-40C4-804F-7EEC18A62FE8", "versionEndExcluding": "5.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:macos:*:*", "matchCriteriaId": "E055EB88-5A25-4348-AAEA-5A25496E5E64", "versionEndExcluding": "5.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:windows:*:*", "matchCriteriaId": "1BF6E442-FE5C-46AF-AE37-4D5A9AB56A3D", "versionEndExcluding": "5.16.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper conditions check in Zoom Team Chat for Zoom clients may allow an authenticated user to conduct a denial of service via network access." }, { "lang": "es", "value": "La verificaci\u00f3n de condiciones inadecuadas en Zoom Team Chat para clientes de Zoom puede permitir que un usuario autenticado lleve a cabo una denegaci\u00f3n de servicio a trav\u00e9s del acceso a la red." } ], "id": "CVE-2023-39205", "lastModified": "2024-11-21T08:14:54.710", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-11-14T23:15:08.887", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-754" } ], "source": "security@zoom.us", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-754" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:windows:*:*", "matchCriteriaId": "61B77771-BBE7-49A8-82C4-0DC27D3D0E97", "versionEndExcluding": "5.15.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper input validation in Zoom Desktop Client for Windows before 5.15.5 may allow an authenticated user to enable an information disclosure via network access." } ], "id": "CVE-2023-39209", "lastModified": "2024-11-21T08:14:55.120", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 4.2, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-08-08T22:15:09.517", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-449" } ], "source": "security@zoom.us", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
4.9 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:android:*:*", "matchCriteriaId": "A529300E-4547-4D4D-B2EB-762C4F107CD8", "versionEndExcluding": "5.14.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:ipad_os:*:*", "matchCriteriaId": "42FCEAAC-A453-4EDA-90A9-A82A23D8F685", "versionEndExcluding": "5.14.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:macos:*:*", "matchCriteriaId": "666607A8-8F43-4B14-9CA7-D851376D05B5", "versionEndExcluding": "5.14.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:windows:*:*", "matchCriteriaId": "8F8E8291-00C6-49CA-AB93-5E9FD0868959", "versionEndExcluding": "5.14.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:virtual_desktop_infrastructure:*:*:*:*:*:*:*:*", "matchCriteriaId": "1430CF6C-7A2B-4755-8AEC-95E706DA1F07", "versionEndExcluding": "5.14.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:android:*:*", "matchCriteriaId": "1A66A1E5-9D2A-4533-B803-6C1B74C7AA5D", "versionEndExcluding": "5.14.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "516E7E40-A476-4277-8363-43FE4F748240", "versionEndExcluding": "5.14.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:linux:*:*", "matchCriteriaId": "3674A229-D066-4C97-93C5-E30824B54742", "versionEndExcluding": "5.14.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:macos:*:*", "matchCriteriaId": "6B3D7B50-B13B-45D3-AE2C-7EBB1DE30FA4", "versionEndExcluding": "5.14.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:windows:*:*", "matchCriteriaId": "B2DE0D4A-F97E-41D3-9906-427BEFFBDB8F", "versionEndExcluding": "5.14.10", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Client-side enforcement of server-side security in Zoom clients before 5.14.10 may allow a privileged user to enable information disclosure via network access." } ], "id": "CVE-2023-39218", "lastModified": "2024-11-21T08:14:56.330", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 5.2, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-08-08T18:15:23.997", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-602" } ], "source": "security@zoom.us", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Vendor | Product | Version | |
---|---|---|---|
zoom | meeting_software_development_kit | * | |
zoom | video_software_development_kit | * | |
zoom | virtual_desktop_infrastructure | * | |
zoom | virtual_desktop_infrastructure | * | |
zoom | zoom | * | |
zoom | zoom | * | |
zoom | zoom | * | |
zoom | zoom | * | |
zoom | zoom | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:*:*:*", "matchCriteriaId": "0105F955-25C8-4582-BD05-8BCD48BFF3D6", "versionEndExcluding": "5.16.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:*:*:*", "matchCriteriaId": "BAE70E1D-8C4A-4EB6-96A8-16C53DB5C79B", "versionEndExcluding": "5.16.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:virtual_desktop_infrastructure:*:*:*:*:*:*:*:*", "matchCriteriaId": "D33A3D73-DB80-4376-A9EE-2905A4B0B4B7", "versionEndExcluding": "5.14.14", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:virtual_desktop_infrastructure:*:*:*:*:*:*:*:*", "matchCriteriaId": "33411E35-8D01-42E4-85D6-0FE2C416E697", "versionEndExcluding": "5.15.12", "versionStartIncluding": "5.15.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:android:*:*", "matchCriteriaId": "F0EA451C-C4DC-48EF-A036-3EEA3E3ADD80", "versionEndExcluding": "5.16.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "C2BF4129-CA54-4ECB-9A6B-EC28445233DF", "versionEndExcluding": "5.16.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:linux:*:*", "matchCriteriaId": "AD4CD81C-1F22-45CA-8AB1-D6D59E819759", "versionEndExcluding": "5.16.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:macos:*:*", "matchCriteriaId": "BB9276FF-17D3-4FDB-91BB-2CE6E8BA61A0", "versionEndExcluding": "5.16.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:windows:*:*", "matchCriteriaId": "19B08EB3-7EBF-416F-91B9-4600E47567F7", "versionEndExcluding": "5.16.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper authentication in some Zoom clients before version 5.16.5 may allow an authenticated user to conduct a denial of service via network access." }, { "lang": "es", "value": "La autenticaci\u00f3n incorrecta en Zoom clients anteriores a la versi\u00f3n 5.16.5 puede permitir que un usuario autenticado realice una denegaci\u00f3n de servicio a trav\u00e9s del acceso a la red." } ], "id": "CVE-2023-49646", "lastModified": "2024-11-21T08:33:39.503", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.1, "impactScore": 2.7, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-12-13T23:15:08.357", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://www.zoom.com/en/trust/security-bulletin/ZSB-23062/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.zoom.com/en/trust/security-bulletin/ZSB-23062/" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-347" } ], "source": "security@zoom.us", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Vendor | Product | Version | |
---|---|---|---|
zoom | meeting_software_development_kit | * | |
zoom | rooms | * | |
zoom | vdi_windows_meeting_clients | * | |
zoom | vdi_windows_meeting_clients | * | |
zoom | vdi_windows_meeting_clients | * | |
zoom | zoom | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:windows:*:*", "matchCriteriaId": "ED921F3E-F076-4037-BAE9-53BDC04F2A4C", "versionEndExcluding": "5.17.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:*:*:*", "matchCriteriaId": "61CCEE1E-F3C0-41EB-8DF2-4D3EA8600166", "versionEndExcluding": "5.17.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:vdi_windows_meeting_clients:*:*:*:*:*:windows:*:*", "matchCriteriaId": "6C7B8981-66F8-4309-98C6-63B4665229EF", "versionEndExcluding": "5.15.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:vdi_windows_meeting_clients:*:*:*:*:*:windows:*:*", "matchCriteriaId": "9705C2B6-78E0-4C1A-B839-58639E7E6AED", "versionEndExcluding": "5.16.2", "versionStartExcluding": "5.15.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:vdi_windows_meeting_clients:*:*:*:*:*:windows:*:*", "matchCriteriaId": "BD5E2981-940C-448D-8449-AD4CAB1651CA", "versionEndExcluding": "5.17.5", "versionStartExcluding": "5.16.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:windows:*:*", "matchCriteriaId": "8ED34AF6-F5F5-45A1-8AF1-C85064789454", "versionEndExcluding": "5.17.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Untrusted search path in some Zoom 32 bit Windows clients may allow an authenticated user to conduct an escalation of privilege via local access.\n" }, { "lang": "es", "value": "Una ruta de b\u00fasqueda que no es de confianza en algunos clientes Zoom de Windows de 32 bits puede permitir que un usuario autenticado realice una escalada de privilegios a trav\u00e9s del acceso local." } ], "id": "CVE-2024-24697", "lastModified": "2024-11-21T08:59:31.737", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.6, "impactScore": 6.0, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-02-14T00:15:47.770", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://www.zoom.com/en/trust/security-bulletin/ZSB-24004/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.zoom.com/en/trust/security-bulletin/ZSB-24004/" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-426" } ], "source": "security@zoom.us", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-426" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Vendor | Product | Version | |
---|---|---|---|
zoom | meeting_software_development_kit | * | |
zoom | vdi_windows_meeting_clients | * | |
zoom | vdi_windows_meeting_clients | * | |
zoom | vdi_windows_meeting_clients | * | |
zoom | zoom | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:windows:*:*", "matchCriteriaId": "ED921F3E-F076-4037-BAE9-53BDC04F2A4C", "versionEndExcluding": "5.17.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:vdi_windows_meeting_clients:*:*:*:*:*:windows:*:*", "matchCriteriaId": "B91935BE-F245-4ADD-A206-D318618BAA1D", "versionEndExcluding": "5.15.15", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:vdi_windows_meeting_clients:*:*:*:*:*:windows:*:*", "matchCriteriaId": "FDCC89D1-EB4D-496D-82C6-B0BBA942286F", "versionEndExcluding": "5.16.12", "versionStartExcluding": "5.15.15", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:vdi_windows_meeting_clients:*:*:*:*:*:windows:*:*", "matchCriteriaId": "19A21230-8A49-434E-840A-2FB9096B0370", "versionEndExcluding": "5.17.0", "versionStartExcluding": "5.16.12", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:windows:*:*", "matchCriteriaId": "8ED34AF6-F5F5-45A1-8AF1-C85064789454", "versionEndExcluding": "5.17.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper input validation in Zoom Desktop Client for Windows, Zoom VDI Client for Windows, and Zoom Meeting SDK for Windows may allow an authenticated user to conduct a disclosure of information via network access.\n\n" }, { "lang": "es", "value": "Una validaci\u00f3n de entrada incorrecta en Zoom Desktop Client para Windows, Zoom VDI Client para Windows y Zoom Meeting SDK para Windows puede permitir que un usuario autenticado realice una divulgaci\u00f3n de informaci\u00f3n a trav\u00e9s del acceso a la red." } ], "id": "CVE-2024-24696", "lastModified": "2024-11-21T08:59:31.570", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 4.0, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-02-14T00:15:47.583", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://www.zoom.com/en/trust/security-bulletin/ZSB-24003/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.zoom.com/en/trust/security-bulletin/ZSB-24003/" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "security@zoom.us", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:windows:*:*", "matchCriteriaId": "3B7131D9-0B21-4DC3-A7FF-C318D862211C", "versionEndExcluding": "5.14.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:windows:*:*", "matchCriteriaId": "2EEE52E3-E80E-4CD2-B778-95F513E5EBFF", "versionEndExcluding": "5.14.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:virtual_desktop_infrastructure:*:*:*:*:*:*:*:*", "matchCriteriaId": "E5FF7C01-346E-4FF6-BDDF-6B642EE08130", "versionEndExcluding": "5.14.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper input validation in the Zoom for Windows, Zoom Rooms, Zoom VDI Windows Meeting clients before 5.14.0 may allow an authenticated user to potentially enable an escalation of privilege via network access." } ], "id": "CVE-2023-34121", "lastModified": "2024-11-21T08:06:35.540", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 1.4, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-06-13T18:15:21.987", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "security@zoom.us", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:windows:*:*", "matchCriteriaId": "B7FE4BA5-8B53-4041-A006-9B4E44398A35", "versionEndExcluding": "5.14.7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Path traversal in Zoom Desktop Client for Windows before 5.14.7 may allow an unauthenticated user to enable an escalation of privilege via network access." }, { "lang": "es", "value": "El recorrido de ruta en Zoom Desktop Client para Windows anterior a 5.14.7 puede permitir que un usuario no autenticado habilite una escalada de privilegios a trav\u00e9s del acceso a la red." } ], "id": "CVE-2023-36534", "lastModified": "2024-11-21T08:09:53.177", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.3, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.8, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-08-08T18:15:14.127", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "security@zoom.us", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Vendor | Product | Version | |
---|---|---|---|
zoom | meetings | * | |
zoom | meetings | * | |
zoom | meetings | * | |
zoom | meetings | * | |
zoom | meetings | * | |
zoom | rooms | * | |
zoom | rooms | * | |
zoom | rooms | * | |
zoom | rooms | * | |
zoom | video_software_development_kit | * | |
zoom | video_software_development_kit | * | |
zoom | video_software_development_kit | * | |
zoom | video_software_development_kit | * | |
zoom | video_software_development_kit | * | |
zoom | virtual_desktop_infrastructure | * | |
zoom | virtual_desktop_infrastructure | * | |
zoom | zoom | * | |
zoom | zoom | * | |
zoom | zoom | * | |
zoom | zoom | * | |
zoom | zoom | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:meetings:*:*:*:*:*:android:*:*", "matchCriteriaId": "6542B8C0-31B4-40A0-B6F3-136C5A16EFE8", "versionEndExcluding": "5.15.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meetings:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "5722E765-C79A-4A21-9E03-2634D5E7F2F9", "versionEndExcluding": "5.15.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meetings:*:*:*:*:*:linux:*:*", "matchCriteriaId": "86B49D79-7C51-46BE-87C2-93717D687531", "versionEndExcluding": "5.15.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meetings:*:*:*:*:*:macos:*:*", "matchCriteriaId": "F6679219-E822-4E14-98CF-1661E343143E", "versionEndExcluding": "5.15.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meetings:*:*:*:*:*:windows:*:*", "matchCriteriaId": "63776027-642A-4B76-A561-F658045ECBD3", "versionEndExcluding": "5.15.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:android:*:*", "matchCriteriaId": "81A22013-04BC-4F45-8295-81C5FD441FC1", "versionEndExcluding": "5.15.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:ipad_os:*:*", "matchCriteriaId": "B399594A-A021-4CCF-BD2D-3E43FC0BF8B2", "versionEndExcluding": "5.15.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:macos:*:*", "matchCriteriaId": "0DACEF42-D48D-4CDD-B72C-0C1C2A63DF96", "versionEndExcluding": "5.15.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:windows:*:*", "matchCriteriaId": "5C73290C-5F04-40AC-BFD8-64E2E53E3EF0", "versionEndExcluding": "5.15.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:android:*:*", "matchCriteriaId": "C29E2E20-94A0-4516-8815-F634290D1C3A", "versionEndExcluding": "5.15.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "10213F87-D42E-47F0-A0E4-3EEC68D024B8", "versionEndExcluding": "5.15.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:linux:*:*", "matchCriteriaId": "6E3A49AF-5716-4516-8BC5-2DF788E6608C", "versionEndExcluding": "5.15.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:macos:*:*", "matchCriteriaId": "24D1C345-4BF0-4027-A7C1-4D2FD8106EFB", "versionEndExcluding": "5.15.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:windows:*:*", "matchCriteriaId": "DE7C3EFB-8CDF-447F-BDFC-2914C7DF8449", "versionEndExcluding": "5.15.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:virtual_desktop_infrastructure:*:*:*:*:*:*:*:*", "matchCriteriaId": "4D26E2D3-9148-44AA-8AF0-A3E58704F532", "versionEndExcluding": "5.14.13", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:virtual_desktop_infrastructure:*:*:*:*:*:*:*:*", "matchCriteriaId": "C3B28CE5-ABB5-43C4-8BB4-133050E0821E", "versionEndExcluding": "5.15.11", "versionStartIncluding": "5.15.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:android:*:*", "matchCriteriaId": "229A05D6-27BE-46A0-ADA8-C37873A24EA0", "versionEndExcluding": "5.15.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "42CDC31F-325B-43A1-8266-34317C644630", "versionEndExcluding": "5.15.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:linux:*:*", "matchCriteriaId": "C7B42405-380C-42AD-9B87-99EB92E433BE", "versionEndExcluding": "5.15.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:macos:*:*", "matchCriteriaId": "351C219A-492B-4DC8-B92F-1B609A16459A", "versionEndExcluding": "5.15.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:windows:*:*", "matchCriteriaId": "3D834D47-BF15-461E-A908-3F7A919C2ED2", "versionEndExcluding": "5.15.10", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in some Zoom clients may allow an unauthenticated user to conduct a denial of service via network access." }, { "lang": "es", "value": "El desbordamiento del b\u00fafer en algunos clientes de Zoom puede permitir que un usuario no autenticado realice una denegaci\u00f3n de servicio a trav\u00e9s del acceso a la red." } ], "id": "CVE-2023-39204", "lastModified": "2024-11-21T08:14:54.570", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-11-14T23:15:08.687", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-120" } ], "source": "security@zoom.us", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-120" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:windows:*:*", "matchCriteriaId": "4D678B4D-3E7B-4130-98C8-4776FB746AFB", "versionEndExcluding": "5.13.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:virtual_desktop_infrastructure:*:*:*:*:*:windows:*:*", "matchCriteriaId": "E0A18B3A-9C99-4865-A353-47343CF7E6A7", "versionEndExcluding": "5.13.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:windows:*:*", "matchCriteriaId": "4603F137-E9B9-4F66-8431-8ABDF1DBFE0C", "versionEndExcluding": "5.13.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Zoom for Windows clients before version 5.13.3, Zoom Rooms for Windows clients before version 5.13.5 and Zoom VDI for Windows clients before 5.13.1 contain an information disclosure vulnerability. A recent update to the Microsoft Edge WebView2 runtime used by the affected Zoom clients, transmitted text to Microsoft\u2019s online Spellcheck service instead of the local Windows Spellcheck. Updating Zoom remediates this vulnerability by disabling the feature. Updating Microsoft Edge WebView2 Runtime to at least version 109.0.1481.0 and restarting Zoom remediates this vulnerability by updating Microsoft\u2019s telemetry behavior." } ], "id": "CVE-2023-22880", "lastModified": "2024-11-21T07:45:34.173", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 4.0, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-03-16T21:15:12.893", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "security@zoom.us", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Vendor | Product | Version | |
---|---|---|---|
zoom | virtual_desktop_infrastructure | * | |
zoom | virtual_desktop_infrastructure | * | |
zoom | zoom | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:virtual_desktop_infrastructure:*:*:*:*:*:*:*:*", "matchCriteriaId": "4D26E2D3-9148-44AA-8AF0-A3E58704F532", "versionEndExcluding": "5.14.13", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:virtual_desktop_infrastructure:*:*:*:*:*:*:*:*", "matchCriteriaId": "C3B28CE5-ABB5-43C4-8BB4-133050E0821E", "versionEndExcluding": "5.15.11", "versionStartIncluding": "5.15.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:windows:*:*", "matchCriteriaId": "1BF6E442-FE5C-46AF-AE37-4D5A9AB56A3D", "versionEndExcluding": "5.16.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Uncontrolled resource consumption in Zoom Team Chat for Zoom Desktop Client for Windows and Zoom VDI Client may allow an unauthenticated user to conduct a disclosure of information via network access." }, { "lang": "es", "value": "El consumo incontrolado de recursos en Zoom Team Chat para Zoom Desktop Client para Windows y Zoom VDI Client puede permitir que un usuario no autenticado realice una divulgaci\u00f3n de informaci\u00f3n a trav\u00e9s del acceso a la red." } ], "id": "CVE-2023-39203", "lastModified": "2024-11-21T08:14:54.440", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-11-14T23:15:08.493", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-789" } ], "source": "security@zoom.us", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:windows:*:*", "matchCriteriaId": "7BEEBBF1-8759-4ED0-912F-29176263A1E3", "versionEndExcluding": "5.14.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient verification of data authenticity in Zoom Desktop Client for Windows before 5.14.5 may allow an authenticated user to enable an escalation of privilege via network access." }, { "lang": "es", "value": "Una verificaci\u00f3n insuficiente de la autenticidad de los datos en Zoom Desktop Client para Windows anterior a 5.14.5 puede permitir que un usuario autenticado habilite una escalada de privilegios a trav\u00e9s del acceso a la red.\n" } ], "id": "CVE-2023-36541", "lastModified": "2024-11-21T08:09:54.107", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 5.9, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-08-08T18:15:14.397", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-345" } ], "source": "security@zoom.us", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-345" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
7.5 (High) - CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:android:*:*", "matchCriteriaId": "9A22E1F9-8302-4990-8118-4A2D6A38A605", "versionEndExcluding": "5.13.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "2F296A18-F2FE-44F8-A803-F5CEE0FEE3CD", "versionEndExcluding": "5.13.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:linux_kernel:*:*", "matchCriteriaId": "BD7706B3-16ED-44E8-B41C-C55E8C715713", "versionEndExcluding": "5.13.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:macos:*:*", "matchCriteriaId": "17083D16-FEE1-4DE4-8EBC-FBCA89AC3DD1", "versionEndExcluding": "5.13.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:windows:*:*", "matchCriteriaId": "186D705B-003C-4991-93FC-AA71C1656C68", "versionEndExcluding": "5.13.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:android:*:*", "matchCriteriaId": "54800A16-98E2-4903-B2B0-D5C66C4AC845", "versionEndExcluding": "5.13.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "35139855-F16B-4149-88EE-05C0C4040C38", "versionEndExcluding": "5.13.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:linux_kernel:*:*", "matchCriteriaId": "1C4200BC-CF56-4795-80EF-0E4D3A43F883", "versionEndExcluding": "5.13.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:macos:*:*", "matchCriteriaId": "A31F4838-E56D-4C7E-BA09-17E10D54A273", "versionEndExcluding": "5.13.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:windows:*:*", "matchCriteriaId": "DDDF143E-324E-4D0C-83D1-2E66DDE760E2", "versionEndExcluding": "5.13.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:virtual_desktop_infrastructure:*:*:*:*:*:*:*:*", "matchCriteriaId": "3FB64BAF-EB86-40B9-A123-7C1C7EFDE5AC", "versionEndExcluding": "5.13.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Zoom clients prior to 5.13.5 contain an improper trust boundary implementation vulnerability. If a victim saves a local recording to an SMB location and later opens it using a link from Zoom\u2019s web portal, an attacker positioned on an adjacent network to the victim client could set up a malicious SMB server to respond to client requests, causing the client to execute attacker controlled executables. This could result in an attacker gaining access to a user\u0027s device and data, and remote code execution." } ], "id": "CVE-2023-28597", "lastModified": "2025-02-19T16:15:37.990", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 6.0, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-03-27T21:15:12.260", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-501" } ], "source": "security@zoom.us", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-501" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:android:*:*", "matchCriteriaId": "7EAF85A9-32B3-4B5E-BA07-AC24AD522AC0", "versionEndExcluding": "5.15.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:virtual_desktop_infrastructure:*:*:*:*:*:*:*:*", "matchCriteriaId": "0891B077-0FB0-4A77-B136-8076EFB8A6F7", "versionEndExcluding": "5.14.12", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:virtual_desktop_infrastructure:*:*:*:*:*:*:*:*", "matchCriteriaId": "E4EBADCC-5581-4079-A9CE-CB119D2FB616", "versionEndExcluding": "5.15.4", "versionStartIncluding": "5.15.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:android:*:*", "matchCriteriaId": "7DE837CD-CC55-4910-83B8-7295E544113A", "versionEndExcluding": "5.15.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "16F58270-1E18-4FF9-BABA-895F7018D514", "versionEndExcluding": "5.15.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:linux:*:*", "matchCriteriaId": "FB104E47-F37D-4B3D-8530-B87893D3AD90", "versionEndExcluding": "5.15.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:macos:*:*", "matchCriteriaId": "CB71D63A-ECCB-4371-B1E3-25BF96E5D84E", "versionEndExcluding": "5.15.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:windows:*:*", "matchCriteriaId": "61B77771-BBE7-49A8-82C4-0DC27D3D0E97", "versionEndExcluding": "5.15.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper authentication in Zoom clients may allow an authenticated user to conduct a denial of service via network access." }, { "lang": "es", "value": "Una autenticaci\u00f3n inadecuada en los clientes de Zoom puede permitir que un usuario autenticado realice una denegaci\u00f3n de servicio a trav\u00e9s del acceso a la red. " } ], "id": "CVE-2023-39215", "lastModified": "2024-11-21T08:14:55.943", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 4.2, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-09-12T20:15:09.203", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-449" } ], "source": "security@zoom.us", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:linux:*:*", "matchCriteriaId": "DB1E61AA-28D0-4F15-857E-D647EF0EEA8E", "versionEndExcluding": "5.13.10", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Zoom for Linux clients prior to 5.13.10 contain an HTML injection vulnerability. If a victim starts a chat with a malicious user it could result in a Zoom application crash." } ], "id": "CVE-2023-28598", "lastModified": "2024-11-21T07:55:38.410", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-06-13T17:15:14.467", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "security@zoom.us", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-74" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:android:*:*", "matchCriteriaId": "A529300E-4547-4D4D-B2EB-762C4F107CD8", "versionEndExcluding": "5.14.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:ipad_os:*:*", "matchCriteriaId": "42FCEAAC-A453-4EDA-90A9-A82A23D8F685", "versionEndExcluding": "5.14.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:macos:*:*", "matchCriteriaId": "666607A8-8F43-4B14-9CA7-D851376D05B5", "versionEndExcluding": "5.14.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:windows:*:*", "matchCriteriaId": "8F8E8291-00C6-49CA-AB93-5E9FD0868959", "versionEndExcluding": "5.14.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:virtual_desktop_infrastructure:*:*:*:*:*:*:*:*", "matchCriteriaId": "1430CF6C-7A2B-4755-8AEC-95E706DA1F07", "versionEndExcluding": "5.14.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:android:*:*", "matchCriteriaId": "1A66A1E5-9D2A-4533-B803-6C1B74C7AA5D", "versionEndExcluding": "5.14.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "516E7E40-A476-4277-8363-43FE4F748240", "versionEndExcluding": "5.14.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:linux:*:*", "matchCriteriaId": "3674A229-D066-4C97-93C5-E30824B54742", "versionEndExcluding": "5.14.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:macos:*:*", "matchCriteriaId": "6B3D7B50-B13B-45D3-AE2C-7EBB1DE30FA4", "versionEndExcluding": "5.14.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:windows:*:*", "matchCriteriaId": "B2DE0D4A-F97E-41D3-9906-427BEFFBDB8F", "versionEndExcluding": "5.14.10", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Client-side enforcement of server-side security in Zoom clients before 5.14.10 may allow an authenticated user to enable information disclosure via network access." }, { "lang": "es", "value": "La aplicaci\u00f3n del lado del cliente de la seguridad del lado del servidor en los clientes en Zoom anteriores a la versi\u00f3n 5.14.10 puede permitir que un usuario autenticado permita la divulgaci\u00f3n de informaci\u00f3n a trav\u00e9s del acceso a la red." } ], "id": "CVE-2023-36535", "lastModified": "2024-11-21T08:09:53.300", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 4.2, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-08-08T18:15:14.207", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-449" } ], "source": "security@zoom.us", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
7.1 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:android:*:*", "matchCriteriaId": "FC27ED9A-B7BF-4D6A-8FEB-F56E31EC1B50", "versionEndExcluding": "5.13.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Zoom for Android clients before version 5.13.0 contain a path traversal vulnerability. A third party app could exploit this vulnerability to read and write to the Zoom application data directory." }, { "lang": "es", "value": "Los clientes de Zoom para Android anteriores a la versi\u00f3n 5.13.0 contienen una vulnerabilidad de path traversal. Una aplicaci\u00f3n de terceros podr\u00eda aprovechar esta vulnerabilidad para leer y escribir en el directorio de datos de la aplicaci\u00f3n Zoom." } ], "id": "CVE-2022-36928", "lastModified": "2024-11-21T07:14:06.330", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 4.2, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-01-09T19:15:11.423", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-35" } ], "source": "security@zoom.us", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:meetings:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "CF877945-AEBB-4347-B45C-DC5CF711EAC0", "versionEndExcluding": "5.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meetings:*:*:*:*:*:linux:*:*", "matchCriteriaId": "E7C90882-B6EB-476E-B8C8-9CA9D2C86328", "versionEndExcluding": "5.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meetings:*:*:*:*:*:windows:*:*", "matchCriteriaId": "E80CFF3B-0BF6-4EF4-878B-B037B5DF1BC5", "versionEndExcluding": "5.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:virtual_desktop_infrastructure:*:*:*:*:*:*:*:*", "matchCriteriaId": "4D26E2D3-9148-44AA-8AF0-A3E58704F532", "versionEndExcluding": "5.14.13", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:virtual_desktop_infrastructure:*:*:*:*:*:*:*:*", "matchCriteriaId": "C3B28CE5-ABB5-43C4-8BB4-133050E0821E", "versionEndExcluding": "5.15.11", "versionStartIncluding": "5.15.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:linux:*:*", "matchCriteriaId": "7EB1DC6F-6270-40C4-804F-7EEC18A62FE8", "versionEndExcluding": "5.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:macos:*:*", "matchCriteriaId": "E055EB88-5A25-4348-AAEA-5A25496E5E64", "versionEndExcluding": "5.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:windows:*:*", "matchCriteriaId": "1BF6E442-FE5C-46AF-AE37-4D5A9AB56A3D", "versionEndExcluding": "5.16.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient control flow management in some Zoom clients may allow an authenticated user to conduct an information disclosure via network access." }, { "lang": "es", "value": "La gesti\u00f3n insuficiente del flujo de control en algunos clientes de Zoom puede permitir que un usuario autenticado realice una divulgaci\u00f3n de informaci\u00f3n a trav\u00e9s del acceso a la red." } ], "id": "CVE-2023-43588", "lastModified": "2024-11-21T08:24:26.977", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 1.4, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-11-15T00:15:08.860", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-449" } ], "source": "security@zoom.us", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
talos-cna@cisco.com | https://talosintelligence.com/vulnerability_reports/TALOS-2020-1055 | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://talosintelligence.com/vulnerability_reports/TALOS-2020-1055 | Exploit, Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:zoom:4.6.10:*:*:*:*:*:*:*", "matchCriteriaId": "64ED8012-19F9-492C-B8B0-EE65A4E41B7B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An exploitable path traversal vulnerability exists in the Zoom client, version 4.6.10 processes messages including animated GIFs. A specially crafted chat message can cause an arbitrary file write, which could potentially be abused to achieve arbitrary code execution. An attacker needs to send a specially crafted message to a target user or a group to exploit this vulnerability." }, { "lang": "es", "value": "Se presenta una vulnerabilidad de salto de ruta explotable en Zoom Client, la versi\u00f3n 4.6.10 procesa mensajes que incluyen GIF animados. Un mensaje de chat especialmente dise\u00f1ado puede causar una escritura de archivo arbitraria, que podr\u00eda ser abusada para lograr una ejecuci\u00f3n de c\u00f3digo arbitraria. Un atacante debe enviar un mensaje especialmente dise\u00f1ado a un usuario o grupo objetivo para explotar esta vulnerabilidad" } ], "id": "CVE-2020-6109", "lastModified": "2024-11-21T05:35:06.790", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 6.0, "source": "talos-cna@cisco.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-08T14:15:12.993", "references": [ { "source": "talos-cna@cisco.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1055" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1055" } ], "sourceIdentifier": "talos-cna@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "talos-cna@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:windows:*:*", "matchCriteriaId": "0AE37FB8-AB87-4FCC-9D7A-375418FEE1A1", "versionEndExcluding": "5.15.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:windows:*:*", "matchCriteriaId": "61B77771-BBE7-49A8-82C4-0DC27D3D0E97", "versionEndExcluding": "5.15.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper privilege management in Zoom Desktop Client for Windows and Zoom Rooms for Windows before 5.15.5 may allow an authenticated user to enable an information disclosure via local access." } ], "id": "CVE-2023-39211", "lastModified": "2024-11-21T08:14:55.400", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 6.0, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-08-08T22:15:10.473", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-347" } ], "source": "security@zoom.us", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-269" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:linux:*:*", "matchCriteriaId": "6BF4E5E2-D96D-4B1E-AF50-C40B11116026", "versionEndExcluding": "2.0.115900.1201", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The ZoomLauncher binary in the Zoom client for Linux before 2.0.115900.1201 does not properly sanitize user input when constructing a shell command, which allows remote attackers to execute arbitrary code by leveraging the zoommtg:// scheme handler." }, { "lang": "es", "value": "El binario ZoomLauncher en el cliente Zoom para Linux en versiones anteriores a la 2.0.115900.1201 no sanea adecuadamente las entradas de usuarios al construir un comando shell, lo que permite que los atacantes remotos ejecuten c\u00f3digo arbitrario aprovechando el controlador de esquemas zoommtg://." } ], "id": "CVE-2017-15049", "lastModified": "2024-11-21T03:14:00.563", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-12-19T15:29:00.290", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/145453/Zoom-Linux-Client-2.0.106600.0904-Command-Injection.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2017/Dec/47" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/convisoappsec/advisories/blob/master/2017/CONVISO-17-003.txt" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/43354/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/145453/Zoom-Linux-Client-2.0.106600.0904-Command-Injection.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2017/Dec/47" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/convisoappsec/advisories/blob/master/2017/CONVISO-17-003.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/43354/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
var-201907-0716
Vulnerability from variot
In the Zoom Client through 4.4.4 and RingCentral 7.0.136380.0312 on macOS, remote attackers can force a user to join a video call with the video camera active. This occurs because any web site can interact with the Zoom web server on localhost port 19421 or 19424. NOTE: a machine remains vulnerable if the Zoom Client was installed in the past and then uninstalled. Blocking exploitation requires additional steps, such as the ZDisableVideo preference and/or killing the web server, deleting the ~/.zoomus directory, and creating a ~/.zoomus plain file. Zoom Client and RingCentral Contains an access control vulnerability.Information may be obtained. ZoomClient is a video conferencing terminal that supports multiple platforms from Zoom Company of the United States. There is an information disclosure vulnerability in ZoomClient. An attacker can leverage this issue to bypass security restrictions and perform unauthorized actions. This may aid in further attacks
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201907-0716", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "zoom", "scope": "lte", "trust": 1.0, "vendor": "zoom", "version": "4.4.4" }, { "model": "ringcentral", "scope": "eq", "trust": 1.0, "vendor": "ringcentral", "version": "7.0.136380.0312" }, { "model": "ringcentral", "scope": "eq", "trust": 0.8, "vendor": "ringcentral", "version": "7.0.136380.0312 (macos)" }, { "model": "client", "scope": "lte", "trust": 0.8, "vendor": "zoom video", "version": "4.4.4 (macos)" }, { "model": "client on macos", "scope": "eq", "trust": 0.6, "vendor": "zoom", "version": "4.4.4" }, { "model": "client", "scope": "eq", "trust": 0.3, "vendor": "zoom", "version": "4.4.4" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-21753" }, { "db": "BID", "id": "109082" }, { "db": "JVNDB", "id": "JVNDB-2019-006352" }, { "db": "NVD", "id": "CVE-2019-13450" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:ringcentral:ringcentral", "vulnerable": true }, { "cpe22Uri": "cpe:/a:zoom:zoom_client", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-006352" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Unknown", "sources": [ { "db": "BID", "id": "109082" }, { "db": "CNNVD", "id": "CNNVD-201907-383" } ], "trust": 0.9 }, "cve": "CVE-2019-13450", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2019-13450", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2019-21753", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2019-13450", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-13450", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2019-13450", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2019-21753", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201907-383", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-21753" }, { "db": "JVNDB", "id": "JVNDB-2019-006352" }, { "db": "CNNVD", "id": "CNNVD-201907-383" }, { "db": "NVD", "id": "CVE-2019-13450" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "In the Zoom Client through 4.4.4 and RingCentral 7.0.136380.0312 on macOS, remote attackers can force a user to join a video call with the video camera active. This occurs because any web site can interact with the Zoom web server on localhost port 19421 or 19424. NOTE: a machine remains vulnerable if the Zoom Client was installed in the past and then uninstalled. Blocking exploitation requires additional steps, such as the ZDisableVideo preference and/or killing the web server, deleting the ~/.zoomus directory, and creating a ~/.zoomus plain file. Zoom Client and RingCentral Contains an access control vulnerability.Information may be obtained. ZoomClient is a video conferencing terminal that supports multiple platforms from Zoom Company of the United States. There is an information disclosure vulnerability in ZoomClient. \nAn attacker can leverage this issue to bypass security restrictions and perform unauthorized actions. This may aid in further attacks", "sources": [ { "db": "NVD", "id": "CVE-2019-13450" }, { "db": "JVNDB", "id": "JVNDB-2019-006352" }, { "db": "CNVD", "id": "CNVD-2019-21753" }, { "db": "BID", "id": "109082" } ], "trust": 2.43 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-13450", "trust": 3.3 }, { "db": "BID", "id": "109082", "trust": 1.9 }, { "db": "JVNDB", "id": "JVNDB-2019-006352", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2019-21753", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201907-383", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-21753" }, { "db": "BID", "id": "109082" }, { "db": "JVNDB", "id": "JVNDB-2019-006352" }, { "db": "CNNVD", "id": "CNNVD-201907-383" }, { "db": "NVD", "id": "CVE-2019-13450" } ] }, "id": "VAR-201907-0716", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2019-21753" } ], "trust": 1.6 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "IoT", "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-21753" } ] }, "last_update_date": "2024-11-23T22:06:08.079000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "https://www.ringcentral.com/" }, { "title": "Zoom@zoom_us", "trust": 0.8, "url": "https://twitter.com/zoom_us/status/1148710712241295361" }, { "title": "VIDEO ON VULNERABILITY", "trust": 0.8, "url": "https://assets.zoom.us/docs/pdf/Zoom+Response+Video-On+Vulnerability.pdf" }, { "title": "Response to Video-On Concern", "trust": 0.8, "url": "https://blog.zoom.us/wordpress/2019/07/08/response-to-video-on-concern/" }, { "title": "Zoom Client Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=94523" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-006352" }, { "db": "CNNVD", "id": "CNNVD-201907-383" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-862", "trust": 1.0 }, { "problemtype": "CWE-284", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-006352" }, { "db": "NVD", "id": "CVE-2019-13450" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.7, "url": "https://news.ycombinator.com/item?id=20387298" }, { "trust": 2.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-13450" }, { "trust": 1.9, "url": "https://twitter.com/moreati/status/1148548799813640193" }, { "trust": 1.9, "url": "https://assets.zoom.us/docs/pdf/zoom+response+video-on+vulnerability.pdf" }, { "trust": 1.6, "url": "https://twitter.com/zoom_us/status/1148710712241295361" }, { "trust": 1.6, "url": "https://blog.zoom.us/wordpress/2019/07/08/response-to-video-on-concern/" }, { "trust": 1.6, "url": "https://bugs.chromium.org/p/chromium/issues/detail?id=951540" }, { "trust": 1.6, "url": "http://www.securityfocus.com/bid/109082" }, { "trust": 1.0, "url": "https://medium.com/%40jonathan.leitschuh/zoom-zero-day-4-million-webcams-maybe-an-rce-just-get-them-to-visit-your-website-ac75c83f4ef5" }, { "trust": 0.9, "url": "https://zoom.us/" }, { "trust": 0.9, "url": "https://medium.com/@jonathan.leitschuh/zoom-zero-day-4-million-webcams-maybe-an-rce-just-get-them-to-visit-your-website-ac75c83f4ef5" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-13450" }, { "trust": 0.6, "url": "https://medium.com/@jonathan.leitschuh/zoom" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-21753" }, { "db": "BID", "id": "109082" }, { "db": "JVNDB", "id": "JVNDB-2019-006352" }, { "db": "CNNVD", "id": "CNNVD-201907-383" }, { "db": "NVD", "id": "CVE-2019-13450" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2019-21753" }, { "db": "BID", "id": "109082" }, { "db": "JVNDB", "id": "JVNDB-2019-006352" }, { "db": "CNNVD", "id": "CNNVD-201907-383" }, { "db": "NVD", "id": "CVE-2019-13450" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-07-09T00:00:00", "db": "CNVD", "id": "CNVD-2019-21753" }, { "date": "2019-07-08T00:00:00", "db": "BID", "id": "109082" }, { "date": "2019-07-18T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-006352" }, { "date": "2019-07-08T00:00:00", "db": "CNNVD", "id": "CNNVD-201907-383" }, { "date": "2019-07-09T06:15:10.820000", "db": "NVD", "id": "CVE-2019-13450" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-07-09T00:00:00", "db": "CNVD", "id": "CNVD-2019-21753" }, { "date": "2019-07-08T00:00:00", "db": "BID", "id": "109082" }, { "date": "2019-07-18T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-006352" }, { "date": "2020-08-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201907-383" }, { "date": "2024-11-21T04:24:55.590000", "db": "NVD", "id": "CVE-2019-13450" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201907-383" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Zoom Client and RingCentral Access control vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-006352" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "access control error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201907-383" } ], "trust": 0.6 } }
var-201907-0715
Vulnerability from variot
In the Zoom Client before 4.4.2 on macOS, remote attackers can cause a denial of service (continual focus grabs) via a sequence of invalid launch?action=join&confno= requests to localhost port 19421. Zoom Client Contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. ZoomClient is a video conferencing terminal that supports multiple platforms from Zoom Company of the United States. There is a security hole in ZoomClient
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201907-0715", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "zoom", "scope": "lt", "trust": 1.0, "vendor": "zoom", "version": "4.4.2" }, { "model": "client", "scope": "lt", "trust": 0.8, "vendor": "zoom video", "version": "4.4.2 (macos)" }, { "model": "client on macos", "scope": "lt", "trust": 0.6, "vendor": "zoom", "version": "4.4.2" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-21754" }, { "db": "JVNDB", "id": "JVNDB-2019-006423" }, { "db": "NVD", "id": "CVE-2019-13449" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:zoom:zoom_client", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-006423" } ] }, "cve": "CVE-2019-13449", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CVE-2019-13449", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2019-21754", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.8, "id": "CVE-2019-13449", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-13449", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2019-13449", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2019-21754", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201907-489", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-21754" }, { "db": "JVNDB", "id": "JVNDB-2019-006423" }, { "db": "CNNVD", "id": "CNNVD-201907-489" }, { "db": "NVD", "id": "CVE-2019-13449" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "In the Zoom Client before 4.4.2 on macOS, remote attackers can cause a denial of service (continual focus grabs) via a sequence of invalid launch?action=join\u0026confno= requests to localhost port 19421. Zoom Client Contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. ZoomClient is a video conferencing terminal that supports multiple platforms from Zoom Company of the United States. There is a security hole in ZoomClient", "sources": [ { "db": "NVD", "id": "CVE-2019-13449" }, { "db": "JVNDB", "id": "JVNDB-2019-006423" }, { "db": "CNVD", "id": "CNVD-2019-21754" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-13449", "trust": 3.0 }, { "db": "JVNDB", "id": "JVNDB-2019-006423", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2019-21754", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201907-489", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-21754" }, { "db": "JVNDB", "id": "JVNDB-2019-006423" }, { "db": "CNNVD", "id": "CNNVD-201907-489" }, { "db": "NVD", "id": "CVE-2019-13449" } ] }, "id": "VAR-201907-0715", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2019-21754" } ], "trust": 1.6 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "IoT", "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-21754" } ] }, "last_update_date": "2024-11-23T22:37:46.380000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Zoom@zoom_us", "trust": 0.8, "url": "https://twitter.com/zoom_us/status/1148710712241295361" }, { "title": "VIDEO ON VULNERABILITY", "trust": 0.8, "url": "https://assets.zoom.us/docs/pdf/Zoom+Response+Video-On+Vulnerability.pdf" }, { "title": "Response to Video-On Concern", "trust": 0.8, "url": "https://blog.zoom.us/wordpress/2019/07/08/response-to-video-on-concern/" }, { "title": "Patch for ZoomClientDOS vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/167559" }, { "title": "Zoom Client Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=94628" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-21754" }, { "db": "JVNDB", "id": "JVNDB-2019-006423" }, { "db": "CNNVD", "id": "CNNVD-201907-489" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-006423" }, { "db": "NVD", "id": "CVE-2019-13449" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-13449" }, { "trust": 1.6, "url": "https://twitter.com/zoom_us/status/1148710712241295361" }, { "trust": 1.6, "url": "https://assets.zoom.us/docs/pdf/zoom+response+video-on+vulnerability.pdf" }, { "trust": 1.6, "url": "https://blog.zoom.us/wordpress/2019/07/08/response-to-video-on-concern/" }, { "trust": 1.6, "url": "https://bugs.chromium.org/p/chromium/issues/detail?id=951540" }, { "trust": 1.0, "url": "https://medium.com/%40jonathan.leitschuh/zoom-zero-day-4-million-webcams-maybe-an-rce-just-get-them-to-visit-your-website-ac75c83f4ef5" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-13449" }, { "trust": 0.6, "url": "https://medium.com/@jonathan.leitschuh/zoom-zero-day-4-million-webcams-maybe-an-rce-just-get-them-to-visit-your-website-ac75c83f4ef5" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-21754" }, { "db": "JVNDB", "id": "JVNDB-2019-006423" }, { "db": "CNNVD", "id": "CNNVD-201907-489" }, { "db": "NVD", "id": "CVE-2019-13449" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2019-21754" }, { "db": "JVNDB", "id": "JVNDB-2019-006423" }, { "db": "CNNVD", "id": "CNNVD-201907-489" }, { "db": "NVD", "id": "CVE-2019-13449" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-07-09T00:00:00", "db": "CNVD", "id": "CNVD-2019-21754" }, { "date": "2019-07-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-006423" }, { "date": "2019-07-09T00:00:00", "db": "CNNVD", "id": "CNNVD-201907-489" }, { "date": "2019-07-09T06:15:10.257000", "db": "NVD", "id": "CVE-2019-13449" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-07-09T00:00:00", "db": "CNVD", "id": "CNVD-2019-21754" }, { "date": "2019-07-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-006423" }, { "date": "2019-07-18T00:00:00", "db": "CNNVD", "id": "CNNVD-201907-489" }, { "date": "2024-11-21T04:24:55.440000", "db": "NVD", "id": "CVE-2019-13449" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201907-489" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Zoom Client Input validation vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-006423" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201907-489" } ], "trust": 0.6 } }