cve-2021-34411
Vulnerability from cvelistv5
Published
2021-09-27 13:55
Modified
2024-08-04 00:12
Severity ?
EPSS score ?
Summary
During the installation process forZoom Rooms for Conference Room for Windows before version 5.3.0 it is possible to launch Internet Explorer with elevated privileges. If the installer was launched with elevated privileges such as by SCCM this can result in a local privilege escalation.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Zoom Rooms for Conference Room for Windows |
Version: All versions before 5.3.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:12:50.229Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Zoom Rooms for Conference Room for Windows", "vendor": "n/a", "versions": [ { "status": "affected", "version": "All versions before 5.3.0" } ] } ], "descriptions": [ { "lang": "en", "value": "During the installation process forZoom Rooms for Conference Room for Windows before version 5.3.0 it is possible to launch Internet Explorer with elevated privileges. If the installer was launched with elevated privileges such as by SCCM this can result in a local privilege escalation." } ], "problemTypes": [ { "descriptions": [ { "description": "Incorrect Privilege Assignment", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-01T21:01:26", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@zoom.us", "ID": "CVE-2021-34411", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Zoom Rooms for Conference Room for Windows", "version": { "version_data": [ { "version_value": "All versions before 5.3.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "During the installation process forZoom Rooms for Conference Room for Windows before version 5.3.0 it is possible to launch Internet Explorer with elevated privileges. If the installer was launched with elevated privileges such as by SCCM this can result in a local privilege escalation." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Incorrect Privilege Assignment" } ] } ] }, "references": { "reference_data": [ { "name": "https://explore.zoom.us/en/trust/security/security-bulletin/", "refsource": "CONFIRM", "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ] } } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2021-34411", "datePublished": "2021-09-27T13:55:50", "dateReserved": "2021-06-09T00:00:00", "dateUpdated": "2024-08-04T00:12:50.229Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2021-34411\",\"sourceIdentifier\":\"security@zoom.us\",\"published\":\"2021-09-27T14:15:08.223\",\"lastModified\":\"2024-11-21T06:10:20.833\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"During the installation process forZoom Rooms for Conference Room for Windows before version 5.3.0 it is possible to launch Internet Explorer with elevated privileges. If the installer was launched with elevated privileges such as by SCCM this can result in a local privilege escalation.\"},{\"lang\":\"es\",\"value\":\"Durante el proceso de instalaci\u00f3n de Zoom Rooms for Conference Room para Windows versiones anteriores a 5.3.0, es posible iniciar Internet Explorer con privilegios elevados. Si el instalador se lanz\u00f3 con privilegios elevados, como por ejemplo por SCCM, esto puede resultar en una escalada de privilegios local\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":4.6,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.9,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-269\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zoom:rooms:*:*:*:*:*:windows:*:*\",\"versionEndExcluding\":\"5.3.0\",\"matchCriteriaId\":\"1470544F-C876-477E-B4CC-86F666DE3833\"}]}]}],\"references\":[{\"url\":\"https://explore.zoom.us/en/trust/security/security-bulletin/\",\"source\":\"security@zoom.us\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://explore.zoom.us/en/trust/security/security-bulletin/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.