Users can help keep themselves secure by removing older versions of the Zoom Opener installer and running the latest version of the Zoom Opener installer from the “Download Now" button on the "Launch Meeting" page. This vulnerability could be used to run arbitrary code on the victim’s host. The Zoom Opener installer for Zoom Client for Meetings before version 5.10.3 and Zoom Rooms for Conference Room for Windows before version 5.10.3 are susceptible to a DLL injection attack. Zoom Rooms for Conference Room (for Android, iOS, Linux, macOS, and Windows) before version 5.11.0ĬVSS Vector String: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:Hĭescription: The Zoom Opener installer is downloaded by a user from the Launch meeting page, when attempting to join a meeting without having the Zoom Meeting Client installed.Zoom VDI Windows Meeting Clients before version 5.10.7.Zoom Client for Meetings (for Android, iOS, Linux, macOS, and Windows) before version 5.11.0.*Changes - Added Zoom Rooms to the “Affected Products” section. If a malicious Zoom meeting URL is opened, the malicious link may direct the user to connect to an arbitrary network address, leading to additional attacks including the potential for remote code execution through launching executables from arbitrary paths. Source: Reported by Christian Zäske of SySS GmbHĬVSS Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:Hĭescription: The Zoom Client for Meetings (for Android, iOS, Linux, macOS, and Windows) before version 5.11.0 are susceptible to a URL parsing vulnerability. Zoom Rooms for Conference Room (for Android, iOS, Linux, macOS, and Windows) before version 5.12.6.Zoom VDI Windows Meeting Clients before version 5.12.6.Zoom Client for Meetings (for Android, iOS, Linux, macOS, and Windows) before version 5.12.6.Zoom VDI for Windows clients before 5.13.1ĬVSS Vector String: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:Nĭescription: The Zoom Client for Meetings (for Android, iOS, Linux, macOS, and Windows) before version 5.12.6 is susceptible to a local information exposure vulnerability.Ī failure to clear data from a local SQL database after a meeting ends and the usage of an insufficiently secure per-device key encrypting that database results in a local malicious user being able to obtain meeting information such as in-meeting chat for the previous meeting attended from that local user account.Zoom Rooms for Windows clients before version 5.13.3.Zoom for Windows clients before version 5.13.3.Updating Microsoft Edge WebView2 Runtime to at least version 1.0 and restarting Zoom remediates this vulnerability by updating Microsoft’s telemetry behavior. Updating Zoom remediates this vulnerability by disabling the feature. A recent update to the Microsoft Edge WebView2 runtime used by the affected Zoom clients, transmitted text to Microsoft’s online Spellcheck service instead of the local Windows Spellcheck. Source: Reported by Zoom Offensive Security TeamĬVSS Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:Nĭescription: Zoom for Windows clients before version 5.13.3, Zoom Rooms for Windows clients before version 5.13.5 and Zoom VDI for Windows clients before 5.13.1 contain an information disclosure vulnerability. Zoom VDI Windows Meeting clients before version 5.13.10.Zoom Rooms (for Linux, macOS, and Windows) clients before version 5.13.5.Zoom (for Linux, macOS, and Windows) clients before version 5.13.5. *Changes - Removed Android and iOS from the “Affected Products” section Users can help keep themselves secure by applying current updates or downloading the latest Zoom software with all current security updates from. This could result in an attacker gaining access to a user's device and data, and remote code execution. If a victim saves a local recording to an SMB location and later opens it using a link from Zoom’s web portal, an attacker positioned on an adjacent network to the victim client could set up a malicious SMB server to respond to client requests, causing the client to execute attacker controlled executables. CVSS Vector String: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:Hĭescription: Zoom clients prior to 5.13.5 contain an improper trust boundary implementation vulnerability.
0 Comments
Leave a Reply. |