#VU105760 Input validation error in Zoom Video Communications, Inc. products - CVE-2024-45422
Published: March 17, 2025
Vulnerability identifier: #VU105760
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2024-45422
CWE-ID: CWE-20
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vulnerable software:
Zoom Workplace Desktop App for macOS
Zoom Workplace Desktop App for Windows
Zoom Workplace Desktop App for Linux
Zoom Rooms Client for Windows
Zoom Rooms Client for macOS
Zoom Rooms Controller for Windows
Zoom Rooms Controller for macOS
Zoom Rooms Controller for Linux
Zoom Workplace App for iOS
Zoom Workplace App for Android
Zoom Rooms Client for iPad
Zoom Rooms Controller for Android
Zoom Video SDK for Windows
Zoom Video SDK for macOS
Zoom Video SDK for iOS
Zoom Video SDK for Android
Zoom Video SDK for Linux
Zoom Meeting SDK for Windows
Zoom Meeting SDK for macOS
Zoom Meeting SDK for iOS
Zoom Meeting SDK for Android
Zoom Meeting SDK for Linux
Zoom Workplace Desktop App for macOS
Zoom Workplace Desktop App for Windows
Zoom Workplace Desktop App for Linux
Zoom Rooms Client for Windows
Zoom Rooms Client for macOS
Zoom Rooms Controller for Windows
Zoom Rooms Controller for macOS
Zoom Rooms Controller for Linux
Zoom Workplace App for iOS
Zoom Workplace App for Android
Zoom Rooms Client for iPad
Zoom Rooms Controller for Android
Zoom Video SDK for Windows
Zoom Video SDK for macOS
Zoom Video SDK for iOS
Zoom Video SDK for Android
Zoom Video SDK for Linux
Zoom Meeting SDK for Windows
Zoom Meeting SDK for macOS
Zoom Meeting SDK for iOS
Zoom Meeting SDK for Android
Zoom Meeting SDK for Linux
Software vendor:
Zoom Video Communications, Inc.
Zoom Video Communications, Inc.
Description
The vulnerability allows a remote attacker to crash the application.
The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.
Remediation
Install updates from vendor's website.