Vulnerability identifier: #VU68630
Vulnerability risk: High
CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID:
CWE-ID:
CWE-20
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Zoom Workplace Desktop App for Windows
Client/Desktop applications /
Office applications
Zoom Workplace Desktop App for Linux
Client/Desktop applications /
Office applications
Zoom Workplace Desktop App for macOS
Client/Desktop applications /
Office applications
Zoom Workplace App for iOS
Mobile applications /
Apps for mobile phones
Zoom Workplace App for Android
Mobile applications /
Apps for mobile phones
Vendor: Zoom Video Communications, Inc.
Description
The vulnerability allows a remote attacker to compromise the affected system.
The vulnerability exists due to insufficient parsing of URLs. A remote attacker can trick the victim into opening a specially crafted link and direct the user to connect to an arbitrary network address, leading to additional attacks including session takeovers.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
Zoom Workplace Desktop App for Windows: 5.0.0 23168.0427 - 5.12.0 8964
Zoom Workplace Desktop App for Linux: 5.1.418436.0628 - 5.12.0 4682
Zoom Workplace App for iOS: 5.0.0 23161.0427 - 5.12.0 4802
Zoom Workplace Desktop App for macOS: 5.0.0 23186.0427 - 5.12.0 11129
Zoom Workplace App for Android: 5.0.1 23478.0429 - 5.12.1 8902
External links
https://explore.zoom.us/en/trust/security/security-bulletin/#ZSB-22024
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.