Vulnerabilites related to Zoom Video Communications Inc - Zoom Rooms for Conference Room (for Android, iOS, Linux, macOS, and Windows)
cve-2022-28764
Vulnerability from cvelistv5
Published
2022-11-14 20:17
Modified
2024-09-17 03:13
Severity ?
EPSS score ?
Summary
The Zoom Client for Meetings (for Android, iOS, Linux, macOS, and Windows) before version 5.12.6 is susceptible to a local information exposure vulnerability. A failure to clear data from a local SQL database after a meeting ends and the usage of an insufficiently secure per-device key encrypting that database results in a local malicious user being able to obtain meeting information such as in-meeting chat for the previous meeting attended from that local user account.
References
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Zoom Video Communications Inc | Zoom Client for Meetings (for Android, iOS, Linux, macOS, and Windows) |
Version: unspecified < 5.12.6 |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:03:52.601Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Zoom Client for Meetings (for Android, iOS, Linux, macOS, and Windows)", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "5.12.6", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Zoom VDI Windows Meeting Clients", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "5.12.6", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Zoom Rooms for Conference Room (for Android, iOS, Linux, macOS, and Windows)", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "5.12.6", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-11-10T00:00:00", "descriptions": [ { "lang": "en", "value": "The Zoom Client for Meetings (for Android, iOS, Linux, macOS, and Windows) before version 5.12.6 is susceptible to a local information exposure vulnerability. A failure to clear data from a local SQL database after a meeting ends and the usage of an insufficiently secure per-device key encrypting that database results in a local malicious user being able to obtain meeting information such as in-meeting chat for the previous meeting attended from that local user account." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-14T00:00:00", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "source": { "discovery": "EXTERNAL" }, "title": "Local information exposure in Zoom Clients", "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2022-28764", "datePublished": "2022-11-14T20:17:59.455063Z", "dateReserved": "2022-04-06T00:00:00", "dateUpdated": "2024-09-17T03:13:55.211Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-28763
Vulnerability from cvelistv5
Published
2022-10-31 19:49
Modified
2024-09-17 01:11
Severity ?
EPSS score ?
Summary
The Zoom Client for Meetings (for Android, iOS, Linux, macOS, and Windows) before version 5.12.2 is susceptible to a URL parsing vulnerability. If a malicious Zoom meeting URL is opened, the malicious link may direct the user to connect to an arbitrary network address, leading to additional attacks including session takeovers.
References
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Zoom Video Communications Inc | Zoom Client for Meetings (for Android, iOS, Linux, macOS, and Windows) |
Version: unspecified < 5.12.2 |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:03:52.575Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Zoom Client for Meetings (for Android, iOS, Linux, macOS, and Windows)", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "5.12.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Zoom VDI Windows Meeting Clients", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "5.12.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Zoom Rooms for Conference Room (for Android, iOS, Linux, macOS, and Windows)", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "5.12.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-10-24T00:00:00", "descriptions": [ { "lang": "en", "value": "The Zoom Client for Meetings (for Android, iOS, Linux, macOS, and Windows) before version 5.12.2 is susceptible to a URL parsing vulnerability. If a malicious Zoom meeting URL is opened, the malicious link may direct the user to connect to an arbitrary network address, leading to additional attacks including session takeovers." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-31T00:00:00", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "source": { "discovery": "INTERNAL" }, "title": "Improper URL parsing in Zoom Clients", "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2022-28763", "datePublished": "2022-10-31T19:49:29.955154Z", "dateReserved": "2022-04-06T00:00:00", "dateUpdated": "2024-09-17T01:11:21.229Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }