#VU66376 Input validation error in Zoom Video Communications, Inc. products - CVE-2022-28755


| Updated: 2022-08-27

Vulnerability identifier: #VU66376

Vulnerability risk: High

CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2022-28755

CWE-ID: CWE-20

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Zoom Workplace Desktop App for Windows
Client/Desktop applications / Office applications
Zoom Workplace Desktop App for macOS
Client/Desktop applications / Office applications
Zoom Workplace Desktop App for Linux
Client/Desktop applications / Office applications
Virtual Desktop Infrastructure (VDI)
Server applications / Conferencing, Collaboration and VoIP solutions
Zoom Workplace App for Android
Mobile applications / Apps for mobile phones
Zoom Workplace App for iOS
Mobile applications / Apps for mobile phones

Vendor: Zoom Video Communications, Inc.

Description

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to insufficient validation of user-supplied input when parsing meeting URL. A remote attacker can trick the victim to follow a specially crafted URL, which can direct the user to connect to an arbitrary network address, leading to additional attacks including the potential for remote code execution through launching executables from arbitrary paths.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Zoom Workplace Desktop App for Windows: 5.0.0 23168.0427 - 5.10.7 6120

Virtual Desktop Infrastructure (VDI): 5.0.1 - 5.10.6

Zoom Workplace App for Android: 5.0.1 23478.0429 - 5.10.6 6331

Zoom Workplace Desktop App for macOS: 5.0.0 23186.0427 - 5.10.7 7748

Zoom Workplace App for iOS: 5.0.0 23161.0427 - 5.10.6 3594

Zoom Workplace Desktop App for Linux: 5.1.418436.0628 - 5.10.7 3311


External links
https://explore.zoom.us/en/trust/security/security-bulletin/#ZSB-22016


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability