Vulnerabilites related to zoom - rooms_for_conference_rooms
Vulnerability from fkie_nvd
Published
2022-04-28 15:15
Modified
2024-11-21 06:47
Severity ?
7.9 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:H
7.1 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
7.1 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
Summary
The Zoom Client for Meetings for Windows prior to version 5.9.7, Zoom Rooms for Conference Room for Windows prior to version 5.10.0, Zoom Plugins for Microsoft Outlook for Windows prior to version 5.10.3, and Zoom VDI Windows Meeting Clients prior to version 5.9.6; was susceptible to a local privilege escalation issue during the installer repair operation. A malicious actor could utilize this to potentially delete system level files or folders, causing integrity or availability issues on the user’s host machine.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zoom | meetings | * | |
zoom | rooms_for_conference_rooms | * | |
zoom | vdi_windows_meeting_clients | * | |
zoom | zoom_plugin_for_microsoft_outlook | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:meetings:*:*:*:*:*:windows:*:*", "matchCriteriaId": "AF4B3DA9-D93E-40A5-A0F6-7B8AC937E044", "versionEndExcluding": "5.9.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_for_conference_rooms:*:*:*:*:*:windows:*:*", "matchCriteriaId": "384AE73D-2B3A-48EE-BA60-E01AABAE69E5", "versionEndExcluding": "5.10.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:vdi_windows_meeting_clients:*:*:*:*:*:*:*:*", "matchCriteriaId": "EB73D24B-5FA0-4009-B13A-C45017BECB84", "versionEndExcluding": "5.9.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom_plugin_for_microsoft_outlook:*:*:*:*:*:windows:*:*", "matchCriteriaId": "99EC22EC-05B3-41D1-BC6D-20A0B1810CD1", "versionEndExcluding": "5.10.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Zoom Client for Meetings for Windows prior to version 5.9.7, Zoom Rooms for Conference Room for Windows prior to version 5.10.0, Zoom Plugins for Microsoft Outlook for Windows prior to version 5.10.3, and Zoom VDI Windows Meeting Clients prior to version 5.9.6; was susceptible to a local privilege escalation issue during the installer repair operation. A malicious actor could utilize this to potentially delete system level files or folders, causing integrity or availability issues on the user\u2019s host machine." }, { "lang": "es", "value": "Zoom Client for Meetings para Windows versiones anteriores a 5.9.7, Zoom Rooms for Conference Room para Windows versiones anteriores a 5.10.0, Zoom Plugins for Microsoft Outlook para Windows versiones anteriores a 5.10.3 y Zoom VDI Windows Meeting Clients versiones anteriores a 5.9.6; eran susceptibles de un problema de escalada de privilegios local durante la operaci\u00f3n de reparaci\u00f3n del instalador. Un actor malicioso podr\u00eda usar esto para eliminar potencialmente archivos o carpetas a nivel de sistema, causando problemas de integridad o disponibilidad en la m\u00e1quina anfitriona del usuario" } ], "id": "CVE-2022-22782", "lastModified": "2024-11-21T06:47:26.380", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.6, "confidentialityImpact": "NONE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 9.2, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.9, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.5, "impactScore": 5.8, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-04-28T15:15:09.847", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-11-24 17:15
Modified
2024-11-21 06:10
Severity ?
Summary
A buffer overflow vulnerability was discovered in Zoom Client for Meetings (for Android, iOS, Linux, macOS, and Windows) before version 5.8.4, Zoom Client for Meetings for Blackberry (for Android and iOS) before version 5.8.1, Zoom Client for Meetings for intune (for Android and iOS) before version 5.8.4, Zoom Client for Meetings for Chrome OS before version 5.0.1, Zoom Rooms for Conference Room (for Android, AndroidBali, macOS, and Windows) before version 5.8.3, Controllers for Zoom Rooms (for Android, iOS, and Windows) before version 5.8.3, Zoom VDI Windows Meeting Client before version 5.8.4, Zoom VDI Azure Virtual Desktop Plugins (for Windows x86 or x64, IGEL x64, Ubuntu x64, HP ThinPro OS x64) before version 5.8.4.21112, Zoom VDI Citrix Plugins (for Windows x86 or x64, Mac Universal Installer & Uninstaller, IGEL x64, eLux RP6 x64, HP ThinPro OS x64, Ubuntu x64, CentOS x 64, Dell ThinOS) before version 5.8.4.21112, Zoom VDI VMware Plugins (for Windows x86 or x64, Mac Universal Installer & Uninstaller, IGEL x64, eLux RP6 x64, HP ThinPro OS x64, Ubuntu x64, CentOS x 64, Dell ThinOS) before version 5.8.4.21112, Zoom Meeting SDK for Android before version 5.7.6.1922, Zoom Meeting SDK for iOS before version 5.7.6.1082, Zoom Meeting SDK for macOS before version 5.7.6.1340, Zoom Meeting SDK for Windows before version 5.7.6.1081, Zoom Video SDK (for Android, iOS, macOS, and Windows) before version 1.1.2, Zoom On-Premise Meeting Connector Controller before version 4.8.12.20211115, Zoom On-Premise Meeting Connector MMR before version 4.8.12.20211115, Zoom On-Premise Recording Connector before version 5.1.0.65.20211116, Zoom On-Premise Virtual Room Connector before version 4.4.7266.20211117, Zoom On-Premise Virtual Room Connector Load Balancer before version 2.5.5692.20211117, Zoom Hybrid Zproxy before version 1.0.1058.20211116, and Zoom Hybrid MMR before version 4.6.20211116.131_x86-64. This can potentially allow a malicious actor to crash the service or application, or leverage this vulnerability to execute arbitrary code.
References
▼ | URL | Tags | |
---|---|---|---|
security@zoom.us | http://packetstormsecurity.com/files/165417/Zoom-Chat-Message-Processing-Buffer-Overflow.html | Third Party Advisory, VDB Entry | |
security@zoom.us | https://explore.zoom.us/en/trust/security/security-bulletin | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/165417/Zoom-Chat-Message-Processing-Buffer-Overflow.html | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://explore.zoom.us/en/trust/security/security-bulletin | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:meetings:*:*:*:*:*:*:*:*", "matchCriteriaId": "54574671-72FA-4FD2-9018-E777D5EE1A61", "versionEndExcluding": "5.8.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:meetings:*:*:*:*:*:*:*:*", "matchCriteriaId": "EBF584BF-ED3F-481B-BD29-44E2900E7F2B", "versionEndExcluding": "5.8.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:meetings:*:*:*:*:*:*:*:*", "matchCriteriaId": "EBF584BF-ED3F-481B-BD29-44E2900E7F2B", "versionEndExcluding": "5.8.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*", "matchCriteriaId": "B5415705-33E5-46D5-8E4D-9EBADC8C5705", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:meetings:*:*:*:*:*:*:*:*", "matchCriteriaId": "EBF584BF-ED3F-481B-BD29-44E2900E7F2B", "versionEndExcluding": "5.8.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:meetings:*:*:*:*:*:*:*:*", "matchCriteriaId": "EBF584BF-ED3F-481B-BD29-44E2900E7F2B", "versionEndExcluding": "5.8.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:meetings_for_blackberry:*:*:*:*:*:*:*:*", "matchCriteriaId": "AB16F4F5-7998-4B81-823B-FED3F277B5E8", "versionEndExcluding": "5.8.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:meetings_for_blackberry:*:*:*:*:*:*:*:*", "matchCriteriaId": "AB16F4F5-7998-4B81-823B-FED3F277B5E8", "versionEndExcluding": "5.8.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*", "matchCriteriaId": "B5415705-33E5-46D5-8E4D-9EBADC8C5705", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:meetings_for_intune:*:*:*:*:*:*:*:*", "matchCriteriaId": "DAFE0141-06ED-4761-96B3-79AFB9AD0426", "versionEndExcluding": "5.8.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*", "matchCriteriaId": "B5415705-33E5-46D5-8E4D-9EBADC8C5705", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:meetings_for_intune:*:*:*:*:*:*:*:*", "matchCriteriaId": "DAFE0141-06ED-4761-96B3-79AFB9AD0426", "versionEndExcluding": "5.8.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:meetings_for_chrome_os:*:*:*:*:*:*:*:*", "matchCriteriaId": "E88C2DAB-8BD7-48AE-A26A-54922850114F", "versionEndExcluding": "5.0.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:rooms_for_conference_rooms:*:*:*:*:*:*:*:*", "matchCriteriaId": "E602469C-1EBD-4DC6-A0D6-3BBD9CCCC0B6", "versionEndExcluding": "5.8.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:rooms_for_conference_rooms:*:*:*:*:*:*:*:*", "matchCriteriaId": "E602469C-1EBD-4DC6-A0D6-3BBD9CCCC0B6", "versionEndExcluding": "5.8.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:rooms_for_conference_rooms:*:*:*:*:*:*:*:*", "matchCriteriaId": "E602469C-1EBD-4DC6-A0D6-3BBD9CCCC0B6", "versionEndExcluding": "5.8.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:controllers_for_zoom_rooms:*:*:*:*:*:*:*:*", "matchCriteriaId": "0AF2E01C-2998-4563-8D86-2AF3E718CBCF", "versionEndExcluding": "5.8.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:controllers_for_zoom_rooms:*:*:*:*:*:*:*:*", "matchCriteriaId": "0AF2E01C-2998-4563-8D86-2AF3E718CBCF", "versionEndExcluding": "5.8.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*", "matchCriteriaId": "B5415705-33E5-46D5-8E4D-9EBADC8C5705", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:controllers_for_zoom_rooms:*:*:*:*:*:*:*:*", "matchCriteriaId": "0AF2E01C-2998-4563-8D86-2AF3E718CBCF", "versionEndExcluding": "5.8.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:virtual_desktop_infrastructure:*:*:*:*:*:*:*:*", "matchCriteriaId": "D8968CF8-E3A4-4F31-B854-52D2FFC20BA6", "versionEndExcluding": "5.8.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:android_meeting_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "3AB4FC6F-E285-42C3-AD6A-934293A0E72F", "versionEndExcluding": "5.7.6.1922", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:iphone_os_meeting_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "1CE1F807-3F50-4D0D-BAF3-1B6FD034C72F", "versionEndExcluding": "5.7.6.1082", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:macos_meeting_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CAC5D04-C343-4B9D-B7DA-06C6536C4E62", "versionEndExcluding": "5.7.6.1340", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:windows_meeting_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "16D89D58-79D0-451A-80E8-276F40538C6D", "versionEndExcluding": "5.7.6.1081", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:android_video_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "8DFCA4FF-655C-4B4E-9A3C-F57FC11240D9", "versionEndExcluding": "1.1.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:iphone_os_video_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "7EF0E5CF-84C7-45DE-B281-630A6CFEC5D4", "versionEndExcluding": "1.1.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:macos_video_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "15F4D215-C140-4828-B9EE-103788C199B1", "versionEndExcluding": "1.1.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:windows_video_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "F5FC356F-C345-4967-8D0A-B10DE968DF2A", "versionEndExcluding": "1.1.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:hybrid_mmr:*:*:*:*:*:*:*:*", "matchCriteriaId": "C92E62ED-7847-4019-A648-A60632BB8649", "versionEndExcluding": "4.6.20211116.131", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:hybrid_zproxy:*:*:*:*:*:*:*:*", "matchCriteriaId": "E529C30C-3A0D-4101-BE95-BC29C15DF4C4", "versionEndExcluding": "1.0.1058.20211116", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom_on-premise_meeting_connector_controller:*:*:*:*:*:*:*:*", "matchCriteriaId": "857DF2E3-9193-4E1F-9C81-80D24DEA3F4A", "versionEndExcluding": "4.8.12.20211115", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom_on-premise_meeting_connector_mmr:*:*:*:*:*:*:*:*", "matchCriteriaId": "6D2F4BF0-F779-43C4-884C-72EEA7A4BB3E", "versionEndExcluding": "4.8.12.20211115", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom_on-premise_recording_connector:*:*:*:*:*:*:*:*", "matchCriteriaId": "A0907DF9-A700-4A52-90A3-2080ABEEB1B8", "versionEndExcluding": "5.1.0.65.20211116", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom_on-premise_virtual_room_connector:*:*:*:*:*:*:*:*", "matchCriteriaId": "CF350487-49C6-4F4B-9349-9F09993C43AB", "versionEndExcluding": "4.4.7266.20211117", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom_on-premise_virtual_room_connector_load_balancer:*:*:*:*:*:*:*:*", "matchCriteriaId": "C6C96B60-2755-464E-A43A-E937E8CCCEB3", "versionEndExcluding": "2.5.5692.20211117", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:vdi_azure_virtual_desktop:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A2AD1FE-6E38-472A-8EB7-6BACA17E037B", "versionEndExcluding": "5.8.4.21112", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:vdi_citrix:*:*:*:*:*:*:*:*", "matchCriteriaId": "1D400D33-A80D-4EBE-969E-9F08170CA5E4", "versionEndExcluding": "5.8.4.21112", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:vdi_vmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FEDAECDC-7271-48C2-99D5-2268D9BB01A1", "versionEndExcluding": "5.8.4.21112", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:vdi_windows_meeting_client:*:*:*:*:*:*:*:*", "matchCriteriaId": "10513A4E-6192-441E-83A3-21BD2D9E8F40", "versionEndExcluding": "5.8.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A buffer overflow vulnerability was discovered in Zoom Client for Meetings (for Android, iOS, Linux, macOS, and Windows) before version 5.8.4, Zoom Client for Meetings for Blackberry (for Android and iOS) before version 5.8.1, Zoom Client for Meetings for intune (for Android and iOS) before version 5.8.4, Zoom Client for Meetings for Chrome OS before version 5.0.1, Zoom Rooms for Conference Room (for Android, AndroidBali, macOS, and Windows) before version 5.8.3, Controllers for Zoom Rooms (for Android, iOS, and Windows) before version 5.8.3, Zoom VDI Windows Meeting Client before version 5.8.4, Zoom VDI Azure Virtual Desktop Plugins (for Windows x86 or x64, IGEL x64, Ubuntu x64, HP ThinPro OS x64) before version 5.8.4.21112, Zoom VDI Citrix Plugins (for Windows x86 or x64, Mac Universal Installer \u0026 Uninstaller, IGEL x64, eLux RP6 x64, HP ThinPro OS x64, Ubuntu x64, CentOS x 64, Dell ThinOS) before version 5.8.4.21112, Zoom VDI VMware Plugins (for Windows x86 or x64, Mac Universal Installer \u0026 Uninstaller, IGEL x64, eLux RP6 x64, HP ThinPro OS x64, Ubuntu x64, CentOS x 64, Dell ThinOS) before version 5.8.4.21112, Zoom Meeting SDK for Android before version 5.7.6.1922, Zoom Meeting SDK for iOS before version 5.7.6.1082, Zoom Meeting SDK for macOS before version 5.7.6.1340, Zoom Meeting SDK for Windows before version 5.7.6.1081, Zoom Video SDK (for Android, iOS, macOS, and Windows) before version 1.1.2, Zoom On-Premise Meeting Connector Controller before version 4.8.12.20211115, Zoom On-Premise Meeting Connector MMR before version 4.8.12.20211115, Zoom On-Premise Recording Connector before version 5.1.0.65.20211116, Zoom On-Premise Virtual Room Connector before version 4.4.7266.20211117, Zoom On-Premise Virtual Room Connector Load Balancer before version 2.5.5692.20211117, Zoom Hybrid Zproxy before version 1.0.1058.20211116, and Zoom Hybrid MMR before version 4.6.20211116.131_x86-64. This can potentially allow a malicious actor to crash the service or application, or leverage this vulnerability to execute arbitrary code." }, { "lang": "es", "value": "Se ha detectado una vulnerabilidad de desbordamiento de b\u00fafer en Zoom Client for Meetings (para Android, iOS, Linux, macOS y Windows) antes de la versi\u00f3n 5.8.4, Zoom Client for Meetings for Blackberry (para Android e iOS) antes de la versi\u00f3n 5.8.1, Zoom Client for Meetings for intune (para Android e iOS) antes de la versi\u00f3n 5.8.4, Zoom Client for Meetings for Chrome OS antes de la versi\u00f3n 5.0.1, Zoom Rooms for Conference Room (para Android, AndroidBali, macOS y Windows) antes de la versi\u00f3n 5. 8.3, Controllers for Zoom Rooms (para Android, iOS y Windows) antes de la versi\u00f3n 5.8.3, Zoom VDI Windows Meeting Client antes de la versi\u00f3n 5.8.4, Zoom VDI Azure Virtual Desktop Plugins (para Windows x86 o x64, IGEL x64, Ubuntu x64, HP ThinPro OS x64) antes de la versi\u00f3n 5. 8.4.21112, Zoom VDI Citrix Plugins (para Windows x86 o x64, Mac Universal Installer \u0026amp; Uninstaller, IGEL x64, eLux RP6 x64, HP ThinPro OS x64, Ubuntu x64, CentOS x 64, Dell ThinOS) antes de la versi\u00f3n 5.8.4. 21112, Zoom VDI VMware Plugins (para Windows x86 o x64, Mac Universal Installer \u0026amp; Uninstaller, IGEL x64, eLux RP6 x64, HP ThinPro OS x64, Ubuntu x64, CentOS x 64, Dell ThinOS) antes de la versi\u00f3n 5.8.4.21112, Zoom Meeting SDK para Android antes de la versi\u00f3n 5. 7.6.1922, Zoom Meeting SDK para iOS antes de la versi\u00f3n 5.7.6.1082, Zoom Meeting SDK para macOS antes de la versi\u00f3n 5.7.6.1340, Zoom Meeting SDK para Windows antes de la versi\u00f3n 5.7.6.1081, Zoom Video SDK (para Android, iOS, macOS y Windows) antes de la versi\u00f3n 1. 1.2, Zoom On-Premise Meeting Connector Controller antes de la versi\u00f3n 4.8.12.20211115, Zoom On-Premise Meeting Connector MMR antes de la versi\u00f3n 4.8.12.20211115, Zoom On-Premise Recording Connector antes de la versi\u00f3n 5.1.0.65.20211116, Zoom On-Premise Virtual Room Connector antes de la versi\u00f3n 4. 4.7266.20211117, Zoom On-Premise Virtual Room Connector Load Balancer antes de la versi\u00f3n 2.5.5692.20211117, Zoom Hybrid Zproxy antes de la versi\u00f3n 1.0.1058.20211116, y Zoom Hybrid MMR antes de la versi\u00f3n 4.6.20211116.131_x86-64. Esto puede permitir potencialmente a un actor malicioso bloquear el servicio o la aplicaci\u00f3n, o aprovechar esta vulnerabilidad para ejecutar c\u00f3digo arbitrario" } ], "id": "CVE-2021-34423", "lastModified": "2024-11-21T06:10:22.413", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.4, "source": "security@zoom.us", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-11-24T17:15:07.757", "references": [ { "source": "security@zoom.us", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/165417/Zoom-Chat-Message-Processing-Buffer-Overflow.html" }, { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/165417/Zoom-Chat-Message-Processing-Buffer-Overflow.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-120" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-11-24 17:15
Modified
2024-11-21 06:10
Severity ?
Summary
A vulnerability was discovered in the Zoom Client for Meetings (for Android, iOS, Linux, macOS, and Windows) before version 5.8.4, Zoom Client for Meetings for Blackberry (for Android and iOS) before version 5.8.1, Zoom Client for Meetings for intune (for Android and iOS) before version 5.8.4, Zoom Client for Meetings for Chrome OS before version 5.0.1, Zoom Rooms for Conference Room (for Android, AndroidBali, macOS, and Windows) before version 5.8.3, Controllers for Zoom Rooms (for Android, iOS, and Windows) before version 5.8.3, Zoom VDI Windows Meeting Client before version 5.8.4, Zoom VDI Azure Virtual Desktop Plugins (for Windows x86 or x64, IGEL x64, Ubuntu x64, HP ThinPro OS x64) before version 5.8.4.21112, Zoom VDI Citrix Plugins (for Windows x86 or x64, Mac Universal Installer & Uninstaller, IGEL x64, eLux RP6 x64, HP ThinPro OS x64, Ubuntu x64, CentOS x 64, Dell ThinOS) before version 5.8.4.21112, Zoom VDI VMware Plugins (for Windows x86 or x64, Mac Universal Installer & Uninstaller, IGEL x64, eLux RP6 x64, HP ThinPro OS x64, Ubuntu x64, CentOS x 64, Dell ThinOS) before version 5.8.4.21112, Zoom Meeting SDK for Android before version 5.7.6.1922, Zoom Meeting SDK for iOS before version 5.7.6.1082, Zoom Meeting SDK for macOS before version 5.7.6.1340, Zoom Meeting SDK for Windows before version 5.7.6.1081, Zoom Video SDK (for Android, iOS, macOS, and Windows) before version 1.1.2, Zoom on-premise Meeting Connector before version 4.8.12.20211115, Zoom on-premise Meeting Connector MMR before version 4.8.12.20211115, Zoom on-premise Recording Connector before version 5.1.0.65.20211116, Zoom on-premise Virtual Room Connector before version 4.4.7266.20211117, Zoom on-premise Virtual Room Connector Load Balancer before version 2.5.5692.20211117, Zoom Hybrid Zproxy before version 1.0.1058.20211116, and Zoom Hybrid MMR before version 4.6.20211116.131_x86-64 which potentially allowed for the exposure of the state of process memory. This issue could be used to potentially gain insight into arbitrary areas of the product's memory.
References
▼ | URL | Tags | |
---|---|---|---|
security@zoom.us | http://packetstormsecurity.com/files/165419/Zoom-MMR-Server-Information-Leak.html | Third Party Advisory, VDB Entry | |
security@zoom.us | https://explore.zoom.us/en/trust/security/security-bulletin | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/165419/Zoom-MMR-Server-Information-Leak.html | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://explore.zoom.us/en/trust/security/security-bulletin | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:meetings:*:*:*:*:*:*:*:*", "matchCriteriaId": "54574671-72FA-4FD2-9018-E777D5EE1A61", "versionEndExcluding": "5.8.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:meetings:*:*:*:*:*:*:*:*", "matchCriteriaId": "EBF584BF-ED3F-481B-BD29-44E2900E7F2B", "versionEndExcluding": "5.8.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:meetings:*:*:*:*:*:*:*:*", "matchCriteriaId": "EBF584BF-ED3F-481B-BD29-44E2900E7F2B", "versionEndExcluding": "5.8.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*", "matchCriteriaId": "B5415705-33E5-46D5-8E4D-9EBADC8C5705", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:meetings:*:*:*:*:*:*:*:*", "matchCriteriaId": "EBF584BF-ED3F-481B-BD29-44E2900E7F2B", "versionEndExcluding": "5.8.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:meetings:*:*:*:*:*:*:*:*", "matchCriteriaId": "EBF584BF-ED3F-481B-BD29-44E2900E7F2B", "versionEndExcluding": "5.8.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:meetings_for_blackberry:*:*:*:*:*:*:*:*", "matchCriteriaId": "AB16F4F5-7998-4B81-823B-FED3F277B5E8", "versionEndExcluding": "5.8.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:meetings_for_blackberry:*:*:*:*:*:*:*:*", "matchCriteriaId": "AB16F4F5-7998-4B81-823B-FED3F277B5E8", "versionEndExcluding": "5.8.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*", "matchCriteriaId": "B5415705-33E5-46D5-8E4D-9EBADC8C5705", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:meetings_for_intune:*:*:*:*:*:*:*:*", "matchCriteriaId": "DAFE0141-06ED-4761-96B3-79AFB9AD0426", "versionEndExcluding": "5.8.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*", "matchCriteriaId": "B5415705-33E5-46D5-8E4D-9EBADC8C5705", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:meetings_for_intune:*:*:*:*:*:*:*:*", "matchCriteriaId": "DAFE0141-06ED-4761-96B3-79AFB9AD0426", "versionEndExcluding": "5.8.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:meetings_for_chrome_os:*:*:*:*:*:*:*:*", "matchCriteriaId": "E88C2DAB-8BD7-48AE-A26A-54922850114F", "versionEndExcluding": "5.0.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:rooms_for_conference_rooms:*:*:*:*:*:*:*:*", "matchCriteriaId": "E602469C-1EBD-4DC6-A0D6-3BBD9CCCC0B6", "versionEndExcluding": "5.8.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:rooms_for_conference_rooms:*:*:*:*:*:*:*:*", "matchCriteriaId": "E602469C-1EBD-4DC6-A0D6-3BBD9CCCC0B6", "versionEndExcluding": "5.8.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:rooms_for_conference_rooms:*:*:*:*:*:*:*:*", "matchCriteriaId": "E602469C-1EBD-4DC6-A0D6-3BBD9CCCC0B6", "versionEndExcluding": "5.8.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:controllers_for_zoom_rooms:*:*:*:*:*:*:*:*", "matchCriteriaId": "0AF2E01C-2998-4563-8D86-2AF3E718CBCF", "versionEndExcluding": "5.8.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:controllers_for_zoom_rooms:*:*:*:*:*:*:*:*", "matchCriteriaId": "0AF2E01C-2998-4563-8D86-2AF3E718CBCF", "versionEndExcluding": "5.8.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*", "matchCriteriaId": "B5415705-33E5-46D5-8E4D-9EBADC8C5705", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:controllers_for_zoom_rooms:*:*:*:*:*:*:*:*", "matchCriteriaId": "0AF2E01C-2998-4563-8D86-2AF3E718CBCF", "versionEndExcluding": "5.8.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:virtual_desktop_infrastructure:*:*:*:*:*:*:*:*", "matchCriteriaId": "D8968CF8-E3A4-4F31-B854-52D2FFC20BA6", "versionEndExcluding": "5.8.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:android_meeting_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "3AB4FC6F-E285-42C3-AD6A-934293A0E72F", "versionEndExcluding": "5.7.6.1922", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:iphone_os_meeting_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "1CE1F807-3F50-4D0D-BAF3-1B6FD034C72F", "versionEndExcluding": "5.7.6.1082", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:macos_meeting_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CAC5D04-C343-4B9D-B7DA-06C6536C4E62", "versionEndExcluding": "5.7.6.1340", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:windows_meeting_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "16D89D58-79D0-451A-80E8-276F40538C6D", "versionEndExcluding": "5.7.6.1081", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:android_video_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "8DFCA4FF-655C-4B4E-9A3C-F57FC11240D9", "versionEndExcluding": "1.1.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:iphone_os_video_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "7EF0E5CF-84C7-45DE-B281-630A6CFEC5D4", "versionEndExcluding": "1.1.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:macos_video_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "15F4D215-C140-4828-B9EE-103788C199B1", "versionEndExcluding": "1.1.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:windows_video_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "F5FC356F-C345-4967-8D0A-B10DE968DF2A", "versionEndExcluding": "1.1.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:hybrid_mmr:*:*:*:*:*:*:*:*", "matchCriteriaId": "C92E62ED-7847-4019-A648-A60632BB8649", "versionEndExcluding": "4.6.20211116.131", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:hybrid_zproxy:*:*:*:*:*:*:*:*", "matchCriteriaId": "E529C30C-3A0D-4101-BE95-BC29C15DF4C4", "versionEndExcluding": "1.0.1058.20211116", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom_on-premise_meeting_connector_controller:*:*:*:*:*:*:*:*", "matchCriteriaId": "857DF2E3-9193-4E1F-9C81-80D24DEA3F4A", "versionEndExcluding": "4.8.12.20211115", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom_on-premise_meeting_connector_mmr:*:*:*:*:*:*:*:*", "matchCriteriaId": "6D2F4BF0-F779-43C4-884C-72EEA7A4BB3E", "versionEndExcluding": "4.8.12.20211115", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom_on-premise_recording_connector:*:*:*:*:*:*:*:*", "matchCriteriaId": "A0907DF9-A700-4A52-90A3-2080ABEEB1B8", "versionEndExcluding": "5.1.0.65.20211116", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom_on-premise_virtual_room_connector:*:*:*:*:*:*:*:*", "matchCriteriaId": "CF350487-49C6-4F4B-9349-9F09993C43AB", "versionEndExcluding": "4.4.7266.20211117", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom_on-premise_virtual_room_connector_load_balancer:*:*:*:*:*:*:*:*", "matchCriteriaId": "C6C96B60-2755-464E-A43A-E937E8CCCEB3", "versionEndExcluding": "2.5.5692.20211117", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:vdi_azure_virtual_desktop:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A2AD1FE-6E38-472A-8EB7-6BACA17E037B", "versionEndExcluding": "5.8.4.21112", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:vdi_citrix:*:*:*:*:*:*:*:*", "matchCriteriaId": "1D400D33-A80D-4EBE-969E-9F08170CA5E4", "versionEndExcluding": "5.8.4.21112", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:vdi_vmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FEDAECDC-7271-48C2-99D5-2268D9BB01A1", "versionEndExcluding": "5.8.4.21112", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was discovered in the Zoom Client for Meetings (for Android, iOS, Linux, macOS, and Windows) before version 5.8.4, Zoom Client for Meetings for Blackberry (for Android and iOS) before version 5.8.1, Zoom Client for Meetings for intune (for Android and iOS) before version 5.8.4, Zoom Client for Meetings for Chrome OS before version 5.0.1, Zoom Rooms for Conference Room (for Android, AndroidBali, macOS, and Windows) before version 5.8.3, Controllers for Zoom Rooms (for Android, iOS, and Windows) before version 5.8.3, Zoom VDI Windows Meeting Client before version 5.8.4, Zoom VDI Azure Virtual Desktop Plugins (for Windows x86 or x64, IGEL x64, Ubuntu x64, HP ThinPro OS x64) before version 5.8.4.21112, Zoom VDI Citrix Plugins (for Windows x86 or x64, Mac Universal Installer \u0026 Uninstaller, IGEL x64, eLux RP6 x64, HP ThinPro OS x64, Ubuntu x64, CentOS x 64, Dell ThinOS) before version 5.8.4.21112, Zoom VDI VMware Plugins (for Windows x86 or x64, Mac Universal Installer \u0026 Uninstaller, IGEL x64, eLux RP6 x64, HP ThinPro OS x64, Ubuntu x64, CentOS x 64, Dell ThinOS) before version 5.8.4.21112, Zoom Meeting SDK for Android before version 5.7.6.1922, Zoom Meeting SDK for iOS before version 5.7.6.1082, Zoom Meeting SDK for macOS before version 5.7.6.1340, Zoom Meeting SDK for Windows before version 5.7.6.1081, Zoom Video SDK (for Android, iOS, macOS, and Windows) before version 1.1.2, Zoom on-premise Meeting Connector before version 4.8.12.20211115, Zoom on-premise Meeting Connector MMR before version 4.8.12.20211115, Zoom on-premise Recording Connector before version 5.1.0.65.20211116, Zoom on-premise Virtual Room Connector before version 4.4.7266.20211117, Zoom on-premise Virtual Room Connector Load Balancer before version 2.5.5692.20211117, Zoom Hybrid Zproxy before version 1.0.1058.20211116, and Zoom Hybrid MMR before version 4.6.20211116.131_x86-64 which potentially allowed for the exposure of the state of process memory. This issue could be used to potentially gain insight into arbitrary areas of the product\u0027s memory." }, { "lang": "es", "value": "Se ha detectado una vulnerabilidad en Zoom Client for Meetings (para Android, iOS, Linux, macOS y Windows) antes de la versi\u00f3n 5.8.4, Zoom Client for Meetings for Blackberry (para Android e iOS) antes de la versi\u00f3n 5.8.1, Zoom Client for Meetings for intune (para Android e iOS) antes de la versi\u00f3n 5.8.4, Zoom Client for Meetings for Chrome OS antes de la versi\u00f3n 5.0.1, Zoom Rooms for Conference Room (para Android, AndroidBali, macOS y Windows) antes de la versi\u00f3n 5.8. 3, Controllers for Zoom Rooms (para Android, iOS y Windows) antes de la versi\u00f3n 5.8.3, Zoom VDI Windows Meeting Client antes de la versi\u00f3n 5.8.4, Zoom VDI Azure Virtual Desktop Plugins (para Windows x86 o x64, IGEL x64, Ubuntu x64, HP ThinPro OS x64) antes de la versi\u00f3n 5. 8.4.21112, Zoom VDI Citrix Plugins (para Windows x86 o x64, Mac Universal Installer \u0026amp; Uninstaller, IGEL x64, eLux RP6 x64, HP ThinPro OS x64, Ubuntu x64, CentOS x 64, Dell ThinOS) antes de la versi\u00f3n 5.8.4. 21112, Zoom VDI VMware Plugins (para Windows x86 o x64, Mac Universal Installer \u0026amp; Uninstaller, IGEL x64, eLux RP6 x64, HP ThinPro OS x64, Ubuntu x64, CentOS x 64, Dell ThinOS) antes de la versi\u00f3n 5.8.4.21112, Zoom Meeting SDK para Android antes de la versi\u00f3n 5.7.6. 1922, Zoom Meeting SDK para iOS antes de la versi\u00f3n 5.7.6.1082, Zoom Meeting SDK para macOS antes de la versi\u00f3n 5.7.6.1340, Zoom Meeting SDK para Windows antes de la versi\u00f3n 5.7.6.1081, Zoom Video SDK (para Android, iOS, macOS y Windows) antes de la versi\u00f3n 1.1.2, Zoom on-premise Meeting Connector antes de la versi\u00f3n 4. 8.12.20211115, Zoom on-premise Meeting Connector MMR antes de la versi\u00f3n 4.8.12.20211115, Zoom on-premise Recording Connector antes de la versi\u00f3n 5.1.0.65.20211116, Zoom on-premise Virtual Room Connector antes de la versi\u00f3n 4.4.7266. 20211117, Zoom on-premise Virtual Room Connector Load Balancer antes de la versi\u00f3n 2.5.5692.20211117, Zoom Hybrid Zproxy antes de la versi\u00f3n 1.0.1058.20211116, y Zoom Hybrid MMR antes de la versi\u00f3n 4.6.20211116.131_x86-64 que potencialmente permit\u00eda la exposici\u00f3n del estado de la memoria del proceso. Este problema podr\u00eda ser utilizado para potencialmente obtener informaci\u00f3n sobre \u00e1reas arbitrarias de la memoria del producto" } ], "id": "CVE-2021-34424", "lastModified": "2024-11-21T06:10:22.600", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "security@zoom.us", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-11-24T17:15:07.807", "references": [ { "source": "security@zoom.us", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/165419/Zoom-MMR-Server-Information-Leak.html" }, { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/165419/Zoom-MMR-Server-Information-Leak.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-10-31 20:15
Modified
2024-11-21 06:57
Severity ?
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
9.6 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
9.6 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
Summary
The Zoom Client for Meetings (for Android, iOS, Linux, macOS, and Windows) before version 5.12.2 is susceptible to a URL parsing vulnerability. If a malicious Zoom meeting URL is opened, the malicious link may direct the user to connect to an arbitrary network address, leading to additional attacks including session takeovers.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zoom | meetings | * | |
zoom | meetings | * | |
zoom | meetings | * | |
zoom | meetings | * | |
zoom | meetings | * | |
zoom | rooms_for_conference_rooms | * | |
zoom | rooms_for_conference_rooms | * | |
zoom | rooms_for_conference_rooms | * | |
zoom | rooms_for_conference_rooms | * | |
zoom | rooms_for_conference_rooms | * | |
zoom | virtual_desktop_infrastructure | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:meetings:*:*:*:*:*:android:*:*", "matchCriteriaId": "5F2D6BCF-D5A2-4260-8F37-F17886CE66F1", "versionEndExcluding": "5.12.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meetings:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "C986D46D-E847-4E7C-A3AA-DC8D80ED8FB0", "versionEndExcluding": "5.12.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meetings:*:*:*:*:*:linux:*:*", "matchCriteriaId": "9ED3B8FD-DB5E-45CE-A367-DDA12360B879", "versionEndExcluding": "5.12.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meetings:*:*:*:*:*:macos:*:*", "matchCriteriaId": "77A79F77-72AD-4B79-9565-5BE8F10EABC7", "versionEndExcluding": "5.12.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meetings:*:*:*:*:*:windows:*:*", "matchCriteriaId": "44BDA1DC-49D5-46B8-A20D-306B312565E4", "versionEndExcluding": "5.12.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_for_conference_rooms:*:*:*:*:*:android:*:*", "matchCriteriaId": "BEC2F966-6E1E-4C52-98F2-4B94C2EBE702", "versionEndExcluding": "5.12.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_for_conference_rooms:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "84C6DA49-C1CC-45C8-9398-0CA632C0FF06", "versionEndExcluding": "5.12.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_for_conference_rooms:*:*:*:*:*:linux:*:*", "matchCriteriaId": "B9CE5951-546F-4D8D-A872-0C30D7535E9E", "versionEndExcluding": "5.12.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_for_conference_rooms:*:*:*:*:*:macos:*:*", "matchCriteriaId": "AADFF528-AA72-4800-A958-DDFE145727F5", "versionEndExcluding": "5.12.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_for_conference_rooms:*:*:*:*:*:windows:*:*", "matchCriteriaId": "F600EDC9-890F-42D6-BF72-78B57D9561B2", "versionEndExcluding": "5.12.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:virtual_desktop_infrastructure:*:*:*:*:*:windows:*:*", "matchCriteriaId": "916C6240-03DF-4EBD-9C48-A7CD42798A67", "versionEndExcluding": "5.12.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Zoom Client for Meetings (for Android, iOS, Linux, macOS, and Windows) before version 5.12.2 is susceptible to a URL parsing vulnerability. If a malicious Zoom meeting URL is opened, the malicious link may direct the user to connect to an arbitrary network address, leading to additional attacks including session takeovers." }, { "lang": "es", "value": "El Zoom Client para Meetings (para Android, iOS, Linux, macOS y Windows) anterior a la versi\u00f3n 5.12.2 es susceptible a una vulnerabilidad de an\u00e1lisis de URL. Si se abre la URL de una reuni\u00f3n de Zoom maliciosa, el enlace malicioso puede dirigir al usuario a conectarse a una direcci\u00f3n de red arbitraria, lo que genera ataques adicionales, incluida la apropiaci\u00f3n de sesiones.\n" } ], "id": "CVE-2022-28763", "lastModified": "2024-11-21T06:57:53.317", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.6, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-10-31T20:15:12.650", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "security@zoom.us", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-601" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2021-34423
Vulnerability from cvelistv5
Published
2021-11-24 16:53
Modified
2024-09-17 03:23
Severity ?
EPSS score ?
Summary
A buffer overflow vulnerability was discovered in Zoom Client for Meetings (for Android, iOS, Linux, macOS, and Windows) before version 5.8.4, Zoom Client for Meetings for Blackberry (for Android and iOS) before version 5.8.1, Zoom Client for Meetings for intune (for Android and iOS) before version 5.8.4, Zoom Client for Meetings for Chrome OS before version 5.0.1, Zoom Rooms for Conference Room (for Android, AndroidBali, macOS, and Windows) before version 5.8.3, Controllers for Zoom Rooms (for Android, iOS, and Windows) before version 5.8.3, Zoom VDI Windows Meeting Client before version 5.8.4, Zoom VDI Azure Virtual Desktop Plugins (for Windows x86 or x64, IGEL x64, Ubuntu x64, HP ThinPro OS x64) before version 5.8.4.21112, Zoom VDI Citrix Plugins (for Windows x86 or x64, Mac Universal Installer & Uninstaller, IGEL x64, eLux RP6 x64, HP ThinPro OS x64, Ubuntu x64, CentOS x 64, Dell ThinOS) before version 5.8.4.21112, Zoom VDI VMware Plugins (for Windows x86 or x64, Mac Universal Installer & Uninstaller, IGEL x64, eLux RP6 x64, HP ThinPro OS x64, Ubuntu x64, CentOS x 64, Dell ThinOS) before version 5.8.4.21112, Zoom Meeting SDK for Android before version 5.7.6.1922, Zoom Meeting SDK for iOS before version 5.7.6.1082, Zoom Meeting SDK for macOS before version 5.7.6.1340, Zoom Meeting SDK for Windows before version 5.7.6.1081, Zoom Video SDK (for Android, iOS, macOS, and Windows) before version 1.1.2, Zoom On-Premise Meeting Connector Controller before version 4.8.12.20211115, Zoom On-Premise Meeting Connector MMR before version 4.8.12.20211115, Zoom On-Premise Recording Connector before version 5.1.0.65.20211116, Zoom On-Premise Virtual Room Connector before version 4.4.7266.20211117, Zoom On-Premise Virtual Room Connector Load Balancer before version 2.5.5692.20211117, Zoom Hybrid Zproxy before version 1.0.1058.20211116, and Zoom Hybrid MMR before version 4.6.20211116.131_x86-64. This can potentially allow a malicious actor to crash the service or application, or leverage this vulnerability to execute arbitrary code.
References
▼ | URL | Tags |
---|---|---|
https://explore.zoom.us/en/trust/security/security-bulletin | x_refsource_MISC | |
http://packetstormsecurity.com/files/165417/Zoom-Chat-Message-Processing-Buffer-Overflow.html | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:12:50.093Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/165417/Zoom-Chat-Message-Processing-Buffer-Overflow.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Zoom Client for Meetings (for Android, iOS, Linux, macOS, and Windows)", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "5.8.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Zoom Client for Meetings for Blackberry (for Android and iOS)", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "5.8.1", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Zoom Client for Meetings for intune (for Android and iOS)", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "5.8.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Zoom Client for Meetings for Chrome OS", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "5.0.1", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Zoom Rooms for Conference Room (for Android, AndroidBali, macOS, and Windows)", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "5.8.3", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Controllers for Zoom Rooms (for Android, iOS, and Windows)", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "5.8.3", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Zoom VDI Windows Meeting Client", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "5.8.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Zoom VDI Azure Virtual Desktop Plugins (for Windows x86 or x64, IGEL x64, Ubuntu x64, HP ThinPro OS x64)", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "5.8.4.21112", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Zoom VDI Citrix Plugins (for Windows x86 or x64, Mac Universal Installer \u0026 Uninstaller, IGEL x64, eLux RP6 x64, HP ThinPro OS x64, Ubuntu x64, CentOS x 64, Dell ThinOS)", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "5.8.4.21112", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Zoom VDI VMware Plugins (for Windows x86 or x64, Mac Universal Installer \u0026 Uninstaller, IGEL x64, eLux RP6 x64, HP ThinPro OS x64, Ubuntu x64, CentOS x 64, Dell ThinOS)", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "5.8.4.21112", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Zoom Meeting SDK for Android", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "5.7.6.1922", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Zoom Meeting SDK for iOS", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "5.7.6.1082", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Zoom Meeting SDK for macOS", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "5.7.6.1340", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Zoom Meeting SDK for Windows", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "5.7.6.1081", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Zoom Video SDK (for Android, iOS, macOS, and Windows)", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "1.1.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Zoom On-Premise Meeting Connector Controller", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "4.8.12.20211115", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Zoom On-Premise Meeting Connector MMR", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "4.8.12.20211115", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Zoom On-Premise Recording Connector", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "5.1.0.65.20211116", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Zoom On-Premise Virtual Room Connector", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "4.4.7266.20211117", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Zoom On-Premise Virtual Room Connector Load Balancer", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "2.5.5692.20211117", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Zoom Hybrid Zproxy", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "1.0.1058.20211116", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Zoom Hybrid MMR", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "4.6.20211116.131_x86-64", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Natalie Silvanovich of Google Project Zero" } ], "datePublic": "2021-11-24T00:00:00", "descriptions": [ { "lang": "en", "value": "A buffer overflow vulnerability was discovered in Zoom Client for Meetings (for Android, iOS, Linux, macOS, and Windows) before version 5.8.4, Zoom Client for Meetings for Blackberry (for Android and iOS) before version 5.8.1, Zoom Client for Meetings for intune (for Android and iOS) before version 5.8.4, Zoom Client for Meetings for Chrome OS before version 5.0.1, Zoom Rooms for Conference Room (for Android, AndroidBali, macOS, and Windows) before version 5.8.3, Controllers for Zoom Rooms (for Android, iOS, and Windows) before version 5.8.3, Zoom VDI Windows Meeting Client before version 5.8.4, Zoom VDI Azure Virtual Desktop Plugins (for Windows x86 or x64, IGEL x64, Ubuntu x64, HP ThinPro OS x64) before version 5.8.4.21112, Zoom VDI Citrix Plugins (for Windows x86 or x64, Mac Universal Installer \u0026 Uninstaller, IGEL x64, eLux RP6 x64, HP ThinPro OS x64, Ubuntu x64, CentOS x 64, Dell ThinOS) before version 5.8.4.21112, Zoom VDI VMware Plugins (for Windows x86 or x64, Mac Universal Installer \u0026 Uninstaller, IGEL x64, eLux RP6 x64, HP ThinPro OS x64, Ubuntu x64, CentOS x 64, Dell ThinOS) before version 5.8.4.21112, Zoom Meeting SDK for Android before version 5.7.6.1922, Zoom Meeting SDK for iOS before version 5.7.6.1082, Zoom Meeting SDK for macOS before version 5.7.6.1340, Zoom Meeting SDK for Windows before version 5.7.6.1081, Zoom Video SDK (for Android, iOS, macOS, and Windows) before version 1.1.2, Zoom On-Premise Meeting Connector Controller before version 4.8.12.20211115, Zoom On-Premise Meeting Connector MMR before version 4.8.12.20211115, Zoom On-Premise Recording Connector before version 5.1.0.65.20211116, Zoom On-Premise Virtual Room Connector before version 4.4.7266.20211117, Zoom On-Premise Virtual Room Connector Load Balancer before version 2.5.5692.20211117, Zoom Hybrid Zproxy before version 1.0.1058.20211116, and Zoom Hybrid MMR before version 4.6.20211116.131_x86-64. This can potentially allow a malicious actor to crash the service or application, or leverage this vulnerability to execute arbitrary code." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T20:06:14", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/165417/Zoom-Chat-Message-Processing-Buffer-Overflow.html" } ], "source": { "discovery": "USER" }, "title": "Buffer overflow in Zoom client and other products", "x_legacyV4Record": { "CVE_data_meta": { "AKA": "Zoom Communications Inc", "ASSIGNER": "security@zoom.us", "DATE_PUBLIC": "2021-11-24T13:00:00.000Z", "ID": "CVE-2021-34423", "STATE": "PUBLIC", "TITLE": "Buffer overflow in Zoom client and other products" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Zoom Client for Meetings (for Android, iOS, Linux, macOS, and Windows)", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.8.4" } ] } }, { "product_name": "Zoom Client for Meetings for Blackberry (for Android and iOS)", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.8.1" } ] } }, { "product_name": "Zoom Client for Meetings for intune (for Android and iOS)", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.8.4" } ] } }, { "product_name": "Zoom Client for Meetings for Chrome OS", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.0.1" } ] } }, { "product_name": "Zoom Rooms for Conference Room (for Android, AndroidBali, macOS, and Windows)", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.8.3" } ] } }, { "product_name": "Controllers for Zoom Rooms (for Android, iOS, and Windows)", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.8.3" } ] } }, { "product_name": "Zoom VDI Windows Meeting Client", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.8.4" } ] } }, { "product_name": "Zoom VDI Azure Virtual Desktop Plugins (for Windows x86 or x64, IGEL x64, Ubuntu x64, HP ThinPro OS x64)", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.8.4.21112" } ] } }, { "product_name": "Zoom VDI Citrix Plugins (for Windows x86 or x64, Mac Universal Installer \u0026 Uninstaller, IGEL x64, eLux RP6 x64, HP ThinPro OS x64, Ubuntu x64, CentOS x 64, Dell ThinOS)", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.8.4.21112" } ] } }, { "product_name": "Zoom VDI VMware Plugins (for Windows x86 or x64, Mac Universal Installer \u0026 Uninstaller, IGEL x64, eLux RP6 x64, HP ThinPro OS x64, Ubuntu x64, CentOS x 64, Dell ThinOS)", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.8.4.21112" } ] } }, { "product_name": "Zoom Meeting SDK for Android", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.7.6.1922" } ] } }, { "product_name": "Zoom Meeting SDK for iOS", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.7.6.1082" } ] } }, { "product_name": "Zoom Meeting SDK for macOS", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.7.6.1340" } ] } }, { "product_name": "Zoom Meeting SDK for Windows", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.7.6.1081" } ] } }, { "product_name": "Zoom Video SDK (for Android, iOS, macOS, and Windows)", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "1.1.2" } ] } }, { "product_name": "Zoom On-Premise Meeting Connector Controller", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "4.8.12.20211115" } ] } }, { "product_name": "Zoom On-Premise Meeting Connector MMR", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "4.8.12.20211115" } ] } }, { "product_name": "Zoom On-Premise Recording Connector", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.1.0.65.20211116" } ] } }, { "product_name": "Zoom On-Premise Virtual Room Connector", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "4.4.7266.20211117" } ] } }, { "product_name": "Zoom On-Premise Virtual Room Connector Load Balancer", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "2.5.5692.20211117" } ] } }, { "product_name": "Zoom Hybrid Zproxy", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "1.0.1058.20211116" } ] } }, { "product_name": "Zoom Hybrid MMR", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "4.6.20211116.131_x86-64" } ] } } ] }, "vendor_name": "Zoom Video Communications Inc" } ] } }, "credit": [ { "lang": "eng", "value": "Natalie Silvanovich of Google Project Zero" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A buffer overflow vulnerability was discovered in Zoom Client for Meetings (for Android, iOS, Linux, macOS, and Windows) before version 5.8.4, Zoom Client for Meetings for Blackberry (for Android and iOS) before version 5.8.1, Zoom Client for Meetings for intune (for Android and iOS) before version 5.8.4, Zoom Client for Meetings for Chrome OS before version 5.0.1, Zoom Rooms for Conference Room (for Android, AndroidBali, macOS, and Windows) before version 5.8.3, Controllers for Zoom Rooms (for Android, iOS, and Windows) before version 5.8.3, Zoom VDI Windows Meeting Client before version 5.8.4, Zoom VDI Azure Virtual Desktop Plugins (for Windows x86 or x64, IGEL x64, Ubuntu x64, HP ThinPro OS x64) before version 5.8.4.21112, Zoom VDI Citrix Plugins (for Windows x86 or x64, Mac Universal Installer \u0026 Uninstaller, IGEL x64, eLux RP6 x64, HP ThinPro OS x64, Ubuntu x64, CentOS x 64, Dell ThinOS) before version 5.8.4.21112, Zoom VDI VMware Plugins (for Windows x86 or x64, Mac Universal Installer \u0026 Uninstaller, IGEL x64, eLux RP6 x64, HP ThinPro OS x64, Ubuntu x64, CentOS x 64, Dell ThinOS) before version 5.8.4.21112, Zoom Meeting SDK for Android before version 5.7.6.1922, Zoom Meeting SDK for iOS before version 5.7.6.1082, Zoom Meeting SDK for macOS before version 5.7.6.1340, Zoom Meeting SDK for Windows before version 5.7.6.1081, Zoom Video SDK (for Android, iOS, macOS, and Windows) before version 1.1.2, Zoom On-Premise Meeting Connector Controller before version 4.8.12.20211115, Zoom On-Premise Meeting Connector MMR before version 4.8.12.20211115, Zoom On-Premise Recording Connector before version 5.1.0.65.20211116, Zoom On-Premise Virtual Room Connector before version 4.4.7266.20211117, Zoom On-Premise Virtual Room Connector Load Balancer before version 2.5.5692.20211117, Zoom Hybrid Zproxy before version 1.0.1058.20211116, and Zoom Hybrid MMR before version 4.6.20211116.131_x86-64. This can potentially allow a malicious actor to crash the service or application, or leverage this vulnerability to execute arbitrary code." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://explore.zoom.us/en/trust/security/security-bulletin", "refsource": "MISC", "url": "https://explore.zoom.us/en/trust/security/security-bulletin" }, { "name": "http://packetstormsecurity.com/files/165417/Zoom-Chat-Message-Processing-Buffer-Overflow.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/165417/Zoom-Chat-Message-Processing-Buffer-Overflow.html" } ] }, "source": { "discovery": "USER" } } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2021-34423", "datePublished": "2021-11-24T16:53:59.967413Z", "dateReserved": "2021-06-09T00:00:00", "dateUpdated": "2024-09-17T03:23:26.376Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-28763
Vulnerability from cvelistv5
Published
2022-10-31 19:49
Modified
2024-09-17 01:11
Severity ?
EPSS score ?
Summary
The Zoom Client for Meetings (for Android, iOS, Linux, macOS, and Windows) before version 5.12.2 is susceptible to a URL parsing vulnerability. If a malicious Zoom meeting URL is opened, the malicious link may direct the user to connect to an arbitrary network address, leading to additional attacks including session takeovers.
References
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Zoom Video Communications Inc | Zoom Client for Meetings (for Android, iOS, Linux, macOS, and Windows) |
Version: unspecified < 5.12.2 |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:03:52.575Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Zoom Client for Meetings (for Android, iOS, Linux, macOS, and Windows)", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "5.12.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Zoom VDI Windows Meeting Clients", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "5.12.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Zoom Rooms for Conference Room (for Android, iOS, Linux, macOS, and Windows)", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "5.12.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-10-24T00:00:00", "descriptions": [ { "lang": "en", "value": "The Zoom Client for Meetings (for Android, iOS, Linux, macOS, and Windows) before version 5.12.2 is susceptible to a URL parsing vulnerability. If a malicious Zoom meeting URL is opened, the malicious link may direct the user to connect to an arbitrary network address, leading to additional attacks including session takeovers." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-31T00:00:00", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "source": { "discovery": "INTERNAL" }, "title": "Improper URL parsing in Zoom Clients", "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2022-28763", "datePublished": "2022-10-31T19:49:29.955154Z", "dateReserved": "2022-04-06T00:00:00", "dateUpdated": "2024-09-17T01:11:21.229Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-34424
Vulnerability from cvelistv5
Published
2021-11-24 16:54
Modified
2024-09-16 17:02
Severity ?
EPSS score ?
Summary
A vulnerability was discovered in the Zoom Client for Meetings (for Android, iOS, Linux, macOS, and Windows) before version 5.8.4, Zoom Client for Meetings for Blackberry (for Android and iOS) before version 5.8.1, Zoom Client for Meetings for intune (for Android and iOS) before version 5.8.4, Zoom Client for Meetings for Chrome OS before version 5.0.1, Zoom Rooms for Conference Room (for Android, AndroidBali, macOS, and Windows) before version 5.8.3, Controllers for Zoom Rooms (for Android, iOS, and Windows) before version 5.8.3, Zoom VDI Windows Meeting Client before version 5.8.4, Zoom VDI Azure Virtual Desktop Plugins (for Windows x86 or x64, IGEL x64, Ubuntu x64, HP ThinPro OS x64) before version 5.8.4.21112, Zoom VDI Citrix Plugins (for Windows x86 or x64, Mac Universal Installer & Uninstaller, IGEL x64, eLux RP6 x64, HP ThinPro OS x64, Ubuntu x64, CentOS x 64, Dell ThinOS) before version 5.8.4.21112, Zoom VDI VMware Plugins (for Windows x86 or x64, Mac Universal Installer & Uninstaller, IGEL x64, eLux RP6 x64, HP ThinPro OS x64, Ubuntu x64, CentOS x 64, Dell ThinOS) before version 5.8.4.21112, Zoom Meeting SDK for Android before version 5.7.6.1922, Zoom Meeting SDK for iOS before version 5.7.6.1082, Zoom Meeting SDK for macOS before version 5.7.6.1340, Zoom Meeting SDK for Windows before version 5.7.6.1081, Zoom Video SDK (for Android, iOS, macOS, and Windows) before version 1.1.2, Zoom on-premise Meeting Connector before version 4.8.12.20211115, Zoom on-premise Meeting Connector MMR before version 4.8.12.20211115, Zoom on-premise Recording Connector before version 5.1.0.65.20211116, Zoom on-premise Virtual Room Connector before version 4.4.7266.20211117, Zoom on-premise Virtual Room Connector Load Balancer before version 2.5.5692.20211117, Zoom Hybrid Zproxy before version 1.0.1058.20211116, and Zoom Hybrid MMR before version 4.6.20211116.131_x86-64 which potentially allowed for the exposure of the state of process memory. This issue could be used to potentially gain insight into arbitrary areas of the product's memory.
References
▼ | URL | Tags |
---|---|---|
https://explore.zoom.us/en/trust/security/security-bulletin | x_refsource_MISC | |
http://packetstormsecurity.com/files/165419/Zoom-MMR-Server-Information-Leak.html | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Zoom Video Communications Inc | Zoom Client for Meetings (for Android, iOS, Linux, macOS, and Windows) |
Version: unspecified < 5.8.4 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:12:50.144Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/165419/Zoom-MMR-Server-Information-Leak.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Zoom Client for Meetings (for Android, iOS, Linux, macOS, and Windows)", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "5.8.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Zoom Client for Meetings for Blackberry (for Android and iOS)", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "5.8.1", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Zoom Client for Meetings for intune (for Android and iOS)", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "5.8.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Zoom Client for Meetings for Chrome OS", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "5.0.1", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Zoom Rooms for Conference Room (for Android, AndroidBali, macOS, and Windows)", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "5.8.3", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Controllers for Zoom Rooms (for Android, iOS, and Windows)", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "5.8.3", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Zoom VDI Windows Meeting Client", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "5.8.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Zoom VDI Azure Virtual Desktop Plugins (for Windows x86 or x64, IGEL x64, Ubuntu x64, HP ThinPro OS x64)", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "5.8.4.21112", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Zoom VDI Citrix Plugins (for Windows x86 or x64, Mac Universal Installer \u0026 Uninstaller, IGEL x64, eLux RP6 x64, HP ThinPro OS x64, Ubuntu x64, CentOS x 64, Dell ThinOS)", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "5.8.4.21112", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Zoom VDI VMware Plugins (for Windows x86 or x64, Mac Universal Installer \u0026 Uninstaller, IGEL x64, eLux RP6 x64, HP ThinPro OS x64, Ubuntu x64, CentOS x 64, Dell ThinOS)", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "5.8.4.21112", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Zoom Meeting SDK for Android", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "5.7.6.1922", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Zoom Meeting SDK for iOS", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "5.7.6.1082", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Zoom Meeting SDK for macOS", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "5.7.6.1340", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Zoom Meeting SDK for Windows", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "5.7.6.1081", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Zoom Video SDK (for Android, iOS, macOS, and Windows)", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "1.1.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Zoom on-premise Meeting Connector", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "4.8.12.20211115", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Zoom on-premise Meeting Connector MMR", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "4.8.12.20211115", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Zoom on-premise Recording Connector", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "5.1.0.65.20211116", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Zoom on-premise Virtual Room Connector", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "4.4.7266.20211117", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Zoom on-premise Virtual Room Connector Load Balancer", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "2.5.5692.20211117", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Zoom Hybrid Zproxy", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "1.0.1058.20211116", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Zoom Hybrid MMR", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "4.6.20211116.131_x86-64", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Natalie Silvanovich of Google Project Zero" } ], "datePublic": "2021-11-24T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability was discovered in the Zoom Client for Meetings (for Android, iOS, Linux, macOS, and Windows) before version 5.8.4, Zoom Client for Meetings for Blackberry (for Android and iOS) before version 5.8.1, Zoom Client for Meetings for intune (for Android and iOS) before version 5.8.4, Zoom Client for Meetings for Chrome OS before version 5.0.1, Zoom Rooms for Conference Room (for Android, AndroidBali, macOS, and Windows) before version 5.8.3, Controllers for Zoom Rooms (for Android, iOS, and Windows) before version 5.8.3, Zoom VDI Windows Meeting Client before version 5.8.4, Zoom VDI Azure Virtual Desktop Plugins (for Windows x86 or x64, IGEL x64, Ubuntu x64, HP ThinPro OS x64) before version 5.8.4.21112, Zoom VDI Citrix Plugins (for Windows x86 or x64, Mac Universal Installer \u0026 Uninstaller, IGEL x64, eLux RP6 x64, HP ThinPro OS x64, Ubuntu x64, CentOS x 64, Dell ThinOS) before version 5.8.4.21112, Zoom VDI VMware Plugins (for Windows x86 or x64, Mac Universal Installer \u0026 Uninstaller, IGEL x64, eLux RP6 x64, HP ThinPro OS x64, Ubuntu x64, CentOS x 64, Dell ThinOS) before version 5.8.4.21112, Zoom Meeting SDK for Android before version 5.7.6.1922, Zoom Meeting SDK for iOS before version 5.7.6.1082, Zoom Meeting SDK for macOS before version 5.7.6.1340, Zoom Meeting SDK for Windows before version 5.7.6.1081, Zoom Video SDK (for Android, iOS, macOS, and Windows) before version 1.1.2, Zoom on-premise Meeting Connector before version 4.8.12.20211115, Zoom on-premise Meeting Connector MMR before version 4.8.12.20211115, Zoom on-premise Recording Connector before version 5.1.0.65.20211116, Zoom on-premise Virtual Room Connector before version 4.4.7266.20211117, Zoom on-premise Virtual Room Connector Load Balancer before version 2.5.5692.20211117, Zoom Hybrid Zproxy before version 1.0.1058.20211116, and Zoom Hybrid MMR before version 4.6.20211116.131_x86-64 which potentially allowed for the exposure of the state of process memory. This issue could be used to potentially gain insight into arbitrary areas of the product\u0027s memory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds Read", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T20:06:11", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/165419/Zoom-MMR-Server-Information-Leak.html" } ], "source": { "discovery": "USER" }, "title": "Process memory exposure in Zoom Client and other products", "x_legacyV4Record": { "CVE_data_meta": { "AKA": "Zoom Communications Inc", "ASSIGNER": "security@zoom.us", "DATE_PUBLIC": "2021-11-24T13:00:00.000Z", "ID": "CVE-2021-34424", "STATE": "PUBLIC", "TITLE": "Process memory exposure in Zoom Client and other products" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Zoom Client for Meetings (for Android, iOS, Linux, macOS, and Windows)", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.8.4" } ] } }, { "product_name": "Zoom Client for Meetings for Blackberry (for Android and iOS)", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.8.1" } ] } }, { "product_name": "Zoom Client for Meetings for intune (for Android and iOS)", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.8.4" } ] } }, { "product_name": "Zoom Client for Meetings for Chrome OS", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.0.1" } ] } }, { "product_name": "Zoom Rooms for Conference Room (for Android, AndroidBali, macOS, and Windows)", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.8.3" } ] } }, { "product_name": "Controllers for Zoom Rooms (for Android, iOS, and Windows)", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.8.3" } ] } }, { "product_name": "Zoom VDI Windows Meeting Client", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.8.4" } ] } }, { "product_name": "Zoom VDI Azure Virtual Desktop Plugins (for Windows x86 or x64, IGEL x64, Ubuntu x64, HP ThinPro OS x64)", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.8.4.21112" } ] } }, { "product_name": "Zoom VDI Citrix Plugins (for Windows x86 or x64, Mac Universal Installer \u0026 Uninstaller, IGEL x64, eLux RP6 x64, HP ThinPro OS x64, Ubuntu x64, CentOS x 64, Dell ThinOS)", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.8.4.21112" } ] } }, { "product_name": "Zoom VDI VMware Plugins (for Windows x86 or x64, Mac Universal Installer \u0026 Uninstaller, IGEL x64, eLux RP6 x64, HP ThinPro OS x64, Ubuntu x64, CentOS x 64, Dell ThinOS)", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.8.4.21112" } ] } }, { "product_name": "Zoom Meeting SDK for Android", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.7.6.1922" } ] } }, { "product_name": "Zoom Meeting SDK for iOS", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.7.6.1082" } ] } }, { "product_name": "Zoom Meeting SDK for macOS", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.7.6.1340" } ] } }, { "product_name": "Zoom Meeting SDK for Windows", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.7.6.1081" } ] } }, { "product_name": "Zoom Video SDK (for Android, iOS, macOS, and Windows)", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "1.1.2" } ] } }, { "product_name": "Zoom on-premise Meeting Connector", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "4.8.12.20211115" } ] } }, { "product_name": "Zoom on-premise Meeting Connector MMR", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "4.8.12.20211115" } ] } }, { "product_name": "Zoom on-premise Recording Connector", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.1.0.65.20211116" } ] } }, { "product_name": "Zoom on-premise Virtual Room Connector", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "4.4.7266.20211117" } ] } }, { "product_name": "Zoom on-premise Virtual Room Connector Load Balancer", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "2.5.5692.20211117" } ] } }, { "product_name": "Zoom Hybrid Zproxy", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "1.0.1058.20211116" } ] } }, { "product_name": "Zoom Hybrid MMR", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "4.6.20211116.131_x86-64" } ] } } ] }, "vendor_name": "Zoom Video Communications Inc" } ] } }, "credit": [ { "lang": "eng", "value": "Natalie Silvanovich of Google Project Zero" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability was discovered in the Zoom Client for Meetings (for Android, iOS, Linux, macOS, and Windows) before version 5.8.4, Zoom Client for Meetings for Blackberry (for Android and iOS) before version 5.8.1, Zoom Client for Meetings for intune (for Android and iOS) before version 5.8.4, Zoom Client for Meetings for Chrome OS before version 5.0.1, Zoom Rooms for Conference Room (for Android, AndroidBali, macOS, and Windows) before version 5.8.3, Controllers for Zoom Rooms (for Android, iOS, and Windows) before version 5.8.3, Zoom VDI Windows Meeting Client before version 5.8.4, Zoom VDI Azure Virtual Desktop Plugins (for Windows x86 or x64, IGEL x64, Ubuntu x64, HP ThinPro OS x64) before version 5.8.4.21112, Zoom VDI Citrix Plugins (for Windows x86 or x64, Mac Universal Installer \u0026 Uninstaller, IGEL x64, eLux RP6 x64, HP ThinPro OS x64, Ubuntu x64, CentOS x 64, Dell ThinOS) before version 5.8.4.21112, Zoom VDI VMware Plugins (for Windows x86 or x64, Mac Universal Installer \u0026 Uninstaller, IGEL x64, eLux RP6 x64, HP ThinPro OS x64, Ubuntu x64, CentOS x 64, Dell ThinOS) before version 5.8.4.21112, Zoom Meeting SDK for Android before version 5.7.6.1922, Zoom Meeting SDK for iOS before version 5.7.6.1082, Zoom Meeting SDK for macOS before version 5.7.6.1340, Zoom Meeting SDK for Windows before version 5.7.6.1081, Zoom Video SDK (for Android, iOS, macOS, and Windows) before version 1.1.2, Zoom on-premise Meeting Connector before version 4.8.12.20211115, Zoom on-premise Meeting Connector MMR before version 4.8.12.20211115, Zoom on-premise Recording Connector before version 5.1.0.65.20211116, Zoom on-premise Virtual Room Connector before version 4.4.7266.20211117, Zoom on-premise Virtual Room Connector Load Balancer before version 2.5.5692.20211117, Zoom Hybrid Zproxy before version 1.0.1058.20211116, and Zoom Hybrid MMR before version 4.6.20211116.131_x86-64 which potentially allowed for the exposure of the state of process memory. This issue could be used to potentially gain insight into arbitrary areas of the product\u0027s memory." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Read" } ] } ] }, "references": { "reference_data": [ { "name": "https://explore.zoom.us/en/trust/security/security-bulletin", "refsource": "MISC", "url": "https://explore.zoom.us/en/trust/security/security-bulletin" }, { "name": "http://packetstormsecurity.com/files/165419/Zoom-MMR-Server-Information-Leak.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/165419/Zoom-MMR-Server-Information-Leak.html" } ] }, "source": { "discovery": "USER" } } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2021-34424", "datePublished": "2021-11-24T16:54:59.469667Z", "dateReserved": "2021-06-09T00:00:00", "dateUpdated": "2024-09-16T17:02:54.742Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-22782
Vulnerability from cvelistv5
Published
2022-04-28 15:00
Modified
2024-09-17 02:37
Severity ?
EPSS score ?
Summary
The Zoom Client for Meetings for Windows prior to version 5.9.7, Zoom Rooms for Conference Room for Windows prior to version 5.10.0, Zoom Plugins for Microsoft Outlook for Windows prior to version 5.10.3, and Zoom VDI Windows Meeting Clients prior to version 5.9.6; was susceptible to a local privilege escalation issue during the installer repair operation. A malicious actor could utilize this to potentially delete system level files or folders, causing integrity or availability issues on the user’s host machine.
References
▼ | URL | Tags |
---|---|---|
https://explore.zoom.us/en/trust/security/security-bulletin/ | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Zoom Video Communications Inc | Zoom Client for Meetings for Windows |
Version: unspecified < 5.9.7 |
||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:21:49.155Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Zoom Client for Meetings for Windows", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "5.9.7", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Zoom Rooms for Conference Room for Windows", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "5.10.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Zoom Plugins for Microsoft Outlook for Windows", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "5.10.3", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Zoom VDI Windows Meeting Clients", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "5.9.6", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Zero Day Initiative" } ], "datePublic": "2022-04-27T00:00:00", "descriptions": [ { "lang": "en", "value": "The Zoom Client for Meetings for Windows prior to version 5.9.7, Zoom Rooms for Conference Room for Windows prior to version 5.10.0, Zoom Plugins for Microsoft Outlook for Windows prior to version 5.10.3, and Zoom VDI Windows Meeting Clients prior to version 5.9.6; was susceptible to a local privilege escalation issue during the installer repair operation. A malicious actor could utilize this to potentially delete system level files or folders, causing integrity or availability issues on the user\u2019s host machine." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.9, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "Incorrect Privilege Assignment", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-28T15:00:14", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "source": { "discovery": "USER" }, "title": "Local privilege escalation in Windows Zoom Clients", "x_legacyV4Record": { "CVE_data_meta": { "AKA": "Zoom Video Communications Inc", "ASSIGNER": "security@zoom.us", "DATE_PUBLIC": "2022-04-27T12:00:00.000Z", "ID": "CVE-2022-22782", "STATE": "PUBLIC", "TITLE": "Local privilege escalation in Windows Zoom Clients" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Zoom Client for Meetings for Windows", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.9.7" } ] } }, { "product_name": "Zoom Rooms for Conference Room for Windows", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.10.0" } ] } }, { "product_name": "Zoom Plugins for Microsoft Outlook for Windows", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.10.3" } ] } }, { "product_name": "Zoom VDI Windows Meeting Clients", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.9.6" } ] } } ] }, "vendor_name": "Zoom Video Communications Inc" } ] } }, "credit": [ { "lang": "eng", "value": "Zero Day Initiative" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Zoom Client for Meetings for Windows prior to version 5.9.7, Zoom Rooms for Conference Room for Windows prior to version 5.10.0, Zoom Plugins for Microsoft Outlook for Windows prior to version 5.10.3, and Zoom VDI Windows Meeting Clients prior to version 5.9.6; was susceptible to a local privilege escalation issue during the installer repair operation. A malicious actor could utilize this to potentially delete system level files or folders, causing integrity or availability issues on the user\u2019s host machine." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.9, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Incorrect Privilege Assignment" } ] } ] }, "references": { "reference_data": [ { "name": "https://explore.zoom.us/en/trust/security/security-bulletin/", "refsource": "MISC", "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ] }, "source": { "discovery": "USER" } } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2022-22782", "datePublished": "2022-04-28T15:00:14.188227Z", "dateReserved": "2022-01-07T00:00:00", "dateUpdated": "2024-09-17T02:37:08.661Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }