Vulnerabilites related to zoom - rooms_controller
CVE-2025-30670 (GCVE-0-2025-30670)
Vulnerability from cvelistv5
Published
2025-04-08 16:20
Modified
2025-04-08 20:20
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-476 - NULL Pointer Dereference
Summary
Null pointer dereference in some Zoom Workplace Apps for Windows may allow an authenticated user to conduct a denial of service via network access.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Communications, Inc | Zoom Workplace Apps for Windows |
Version: See references. < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-30670", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-08T20:19:39.676032Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-08T20:20:47.470Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Zoom Workplace Apps for Windows", "vendor": "Zoom Communications, Inc", "versions": [ { "status": "affected", "version": "See references.", "versionType": "custom" } ] } ], "datePublic": "2025-04-08T12:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Null pointer dereference in some Zoom Workplace Apps for Windows may allow an authenticated user to conduct a denial of service via network access.\u003cbr\u003e" } ], "value": "Null pointer dereference in some Zoom Workplace Apps for Windows may allow an authenticated user to conduct a denial of service via network access." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-08T16:20:54.607Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-25015" } ], "source": { "discovery": "UNKNOWN" }, "title": "Zoom Workplace Apps for Windows - Null Pointer", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2025-30670", "datePublished": "2025-04-08T16:20:54.607Z", "dateReserved": "2025-03-24T22:35:25.476Z", "dateUpdated": "2025-04-08T20:20:47.470Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-0149 (GCVE-0-2025-0149)
Vulnerability from cvelistv5
Published
2025-03-11 17:04
Modified
2025-03-11 19:18
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-345 - Insufficient Verification of Data Authenticity
Summary
Insufficient verification of data authenticity in some Zoom Workplace Apps may allow an unprivileged user to conduct a denial of service via network access.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Communications, Inc | Zoom Apps |
Version: See references |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-0149", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-11T19:18:21.457582Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-11T19:18:34.860Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows", "MacOS", "Linux", "iOS", "Android" ], "product": "Zoom Apps", "vendor": "Zoom Communications, Inc", "versions": [ { "status": "affected", "version": "See references" } ] } ], "datePublic": "2025-03-11T12:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Insufficient verification of data authenticity in some Zoom Workplace Apps may allow an unprivileged user to conduct a denial of service via network access." } ], "value": "Insufficient verification of data authenticity in some Zoom Workplace Apps may allow an unprivileged user to conduct a denial of service via network access." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-345", "description": "CWE-345 Insufficient Verification of Data Authenticity", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-11T17:11:46.219Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-25008/" } ], "source": { "discovery": "UNKNOWN" }, "title": "Zoom Apps - Insufficient Verification of Data Authenticity", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2025-0149", "datePublished": "2025-03-11T17:04:02.453Z", "dateReserved": "2024-12-23T21:42:58.197Z", "dateUpdated": "2025-03-11T19:18:34.860Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-39823 (GCVE-0-2024-39823)
Vulnerability from cvelistv5
Published
2024-08-14 16:39
Modified
2024-08-14 17:24
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Summary
Sensitive information disclosure in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow a privileged user to conduct an information disclosure via network access.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Communications Inc. | Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers |
Version: see references |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-39823", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-14T17:24:09.496617Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-14T17:24:16.206Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows", "MacOS", "Linux", "iOS", "Android" ], "product": "Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers", "vendor": "Zoom Communications Inc.", "versions": [ { "status": "affected", "version": "see references" } ] } ], "datePublic": "2024-08-13T12:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Sensitive information disclosure in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow a privileged user to conduct an information disclosure via network access." } ], "value": "Sensitive information disclosure in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow a privileged user to conduct an information disclosure via network access." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-14T16:39:13.132Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24030" } ], "source": { "discovery": "UNKNOWN" }, "title": "Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers - Sensitive Information Exposure", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2024-39823", "datePublished": "2024-08-14T16:39:13.132Z", "dateReserved": "2024-06-28T19:43:03.519Z", "dateUpdated": "2024-08-14T17:24:16.206Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-39822 (GCVE-0-2024-39822)
Vulnerability from cvelistv5
Published
2024-08-14 16:38
Modified
2024-08-16 19:18
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Summary
Sensitive information exposure in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow an authenticated user to conduct an information disclosure via network access.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Communications Inc. | Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers |
Version: see references |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-39822", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-16T19:18:36.184406Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-16T19:18:44.815Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows", "MacOS", "Linux", "iOS", "Android" ], "product": "Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers", "vendor": "Zoom Communications Inc.", "versions": [ { "status": "affected", "version": "see references" } ] } ], "datePublic": "2024-08-13T12:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Sensitive information exposure in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow an authenticated user to conduct an information disclosure via network access." } ], "value": "Sensitive information exposure in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow an authenticated user to conduct an information disclosure via network access." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-14T16:38:03.416Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24029" } ], "source": { "discovery": "UNKNOWN" }, "title": "Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers - Sensitive Information Exposure", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2024-39822", "datePublished": "2024-08-14T16:38:03.416Z", "dateReserved": "2024-06-28T19:43:03.519Z", "dateUpdated": "2024-08-16T19:18:44.815Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-30666 (GCVE-0-2025-30666)
Vulnerability from cvelistv5
Published
2025-05-14 17:35
Modified
2025-05-14 19:00
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-476 - NULL Pointer Dereference
Summary
NULL pointer dereference in some Zoom Workplace Apps for Windows may allow an authenticated user to conduct a denial of service via network access.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Communications, Inc | Zoom Workplace Apps for Windows |
Version: see references |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-30666", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-14T18:01:29.356909Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-14T19:00:27.119Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Zoom Workplace Apps for Windows", "vendor": "Zoom Communications, Inc", "versions": [ { "status": "affected", "version": "see references" } ] } ], "datePublic": "2025-05-13T12:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "NULL pointer dereference in some Zoom Workplace Apps for Windows may allow an authenticated user to conduct a denial of service via network access.\u003cbr\u003e" } ], "value": "NULL pointer dereference in some Zoom Workplace Apps for Windows may allow an authenticated user to conduct a denial of service via network access." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-14T17:35:15.485Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-25018" } ], "source": { "discovery": "UNKNOWN" }, "title": "Zoom Workplace Apps for Windows - NULL Pointer Dereference", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2025-30666", "datePublished": "2025-05-14T17:35:15.485Z", "dateReserved": "2025-03-24T22:35:25.475Z", "dateUpdated": "2025-05-14T19:00:27.119Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-46785 (GCVE-0-2025-46785)
Vulnerability from cvelistv5
Published
2025-05-14 17:41
Modified
2025-05-14 19:00
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-120 - Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Summary
Buffer over-read in some Zoom Workplace Apps for Windows may allow an authenticated user to conduct a denial of service via network access.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Communications, Inc | Zoom Workplace Apps |
Version: see references |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-46785", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-14T17:54:10.661112Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-14T19:00:08.453Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Zoom Workplace Apps", "vendor": "Zoom Communications, Inc", "versions": [ { "status": "affected", "version": "see references" } ] } ], "datePublic": "2025-05-13T12:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Buffer over-read in some Zoom Workplace Apps for Windows may allow an authenticated user to conduct a denial of service via network access.\u003cbr\u003e\u003cbr\u003e" } ], "value": "Buffer over-read in some Zoom Workplace Apps for Windows may allow an authenticated user to conduct a denial of service via network access." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-14T17:41:06.374Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-25021" } ], "source": { "discovery": "UNKNOWN" }, "title": "Zoom Workplace Apps for Windows - Buffer Over-read", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2025-46785", "datePublished": "2025-05-14T17:41:06.374Z", "dateReserved": "2025-04-29T21:24:03.394Z", "dateUpdated": "2025-05-14T19:00:08.453Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-39824 (GCVE-0-2024-39824)
Vulnerability from cvelistv5
Published
2024-08-14 16:39
Modified
2024-08-14 18:07
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Summary
Sensitive information disclosure in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow a privileged user to conduct an information disclosure via network access.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Communications Inc. | Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers |
Version: see references |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-39824", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-14T18:07:03.024733Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-14T18:07:26.505Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows", "MacOS", "Linux", "iOS", "Android" ], "product": "Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers", "vendor": "Zoom Communications Inc.", "versions": [ { "status": "affected", "version": "see references" } ] } ], "datePublic": "2024-08-13T12:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Sensitive information disclosure in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow a privileged user to conduct an information disclosure via network access." } ], "value": "Sensitive information disclosure in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow a privileged user to conduct an information disclosure via network access." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-14T16:39:26.880Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24030" } ], "source": { "discovery": "UNKNOWN" }, "title": "Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers - Sensitive Information Exposure", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2024-39824", "datePublished": "2024-08-14T16:39:26.880Z", "dateReserved": "2024-06-28T19:43:03.519Z", "dateUpdated": "2024-08-14T18:07:26.505Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-45421 (GCVE-0-2024-45421)
Vulnerability from cvelistv5
Published
2025-02-25 19:55
Modified
2025-02-25 20:09
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-122 - Heap-based Buffer Overflow
Summary
Buffer overflow in some Zoom Apps may allow an authenticated user to conduct an escalation of privilege via network access.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Communications, Inc | Zoom Apps |
Version: See references < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-45421", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-25T20:08:54.319536Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-25T20:09:12.193Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "MacOS", "Linux", "Windows", "iOS", "Android" ], "product": "Zoom Apps", "vendor": "Zoom Communications, Inc", "versions": [ { "status": "affected", "version": "See references", "versionType": "custom" } ] } ], "datePublic": "2024-11-12T13:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Buffer overflow in some Zoom Apps may allow an authenticated user to conduct an escalation of privilege via network access.\u003cbr\u003e" } ], "value": "Buffer overflow in some Zoom Apps may allow an authenticated user to conduct an escalation of privilege via network access." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122 Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-25T19:55:02.666Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24043/" } ], "source": { "discovery": "UNKNOWN" }, "title": "Zoom Apps - Buffer Overflow", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2024-45421", "datePublished": "2025-02-25T19:55:02.666Z", "dateReserved": "2024-08-28T21:50:25.332Z", "dateUpdated": "2025-02-25T20:09:12.193Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-0146 (GCVE-0-2025-0146)
Vulnerability from cvelistv5
Published
2025-01-30 19:47
Modified
2025-01-30 21:22
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-59 - Improper Link Resolution Before File Access ('Link Following')
Summary
Symlink following in the installer for Zoom Workplace App for macOS before 6.2.10 may allow an authenticated user to conduct a denial of service via local access.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Communications, Inc | Zoom Workplace app for macOS |
Version: 0 < 6.2.10 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-0146", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-30T21:22:34.395616Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-30T21:22:42.397Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "MacOS" ], "product": "Zoom Workplace app for macOS", "vendor": "Zoom Communications, Inc", "versions": [ { "lessThan": "6.2.10", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "datePublic": "2025-01-14T13:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cb\u003e\u003cspan style=\"background-color: transparent;\"\u003eSymlink following in the installer for Zoom Workplace App for macOS before 6.2.10 may allow an authenticated user to conduct a denial of service via local access.\u003cbr\u003e\u003cbr\u003e\u003c/span\u003e\u003c/b\u003e" } ], "value": "Symlink following in the installer for Zoom Workplace App for macOS before 6.2.10 may allow an authenticated user to conduct a denial of service via local access." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.9, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-59", "description": "CWE-59 Improper Link Resolution Before File Access (\u0027Link Following\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-30T19:47:26.128Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-25005/" } ], "source": { "discovery": "UNKNOWN" }, "title": "Zoom Workplace app for macOS - Symlink Following", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2025-0146", "datePublished": "2025-01-30T19:47:26.128Z", "dateReserved": "2024-12-23T21:42:55.340Z", "dateUpdated": "2025-01-30T21:22:42.397Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-42435 (GCVE-0-2024-42435)
Vulnerability from cvelistv5
Published
2024-08-14 16:39
Modified
2024-08-15 13:58
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Summary
Sensitive information disclosure in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow a privileged user to conduct an information disclosure via network access.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Communications Inc. | Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers |
Version: see references |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-42435", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-15T13:57:52.940338Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-15T13:58:02.205Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows", "MacOS", "Linux", "iOS", "Android" ], "product": "Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers", "vendor": "Zoom Communications Inc.", "versions": [ { "status": "affected", "version": "see references" } ] } ], "datePublic": "2024-08-13T12:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Sensitive information disclosure in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow a privileged user to conduct an information disclosure via network access." } ], "value": "Sensitive information disclosure in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow a privileged user to conduct an information disclosure via network access." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-14T16:39:46.183Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24030" } ], "source": { "discovery": "UNKNOWN" }, "title": "Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers - Sensitive Information Exposure", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2024-42435", "datePublished": "2024-08-14T16:39:46.183Z", "dateReserved": "2024-08-01T19:13:16.137Z", "dateUpdated": "2024-08-15T13:58:02.205Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-45419 (GCVE-0-2024-45419)
Vulnerability from cvelistv5
Published
2024-11-19 19:28
Modified
2024-11-19 21:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-252 - Unchecked Return Value
Summary
Improper input validation in some Zoom Apps may allow an unauthenticated user to conduct a disclosure of information via network access.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Communications Inc. | Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers |
Version: see references |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:zoom:zoom_meeting_sdk_for_windows:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "zoom_meeting_sdk_for_windows", "vendor": "zoom", "versions": [ { "status": "affected", "version": "6.2.0" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-45419", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-19T21:43:54.392171Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-19T21:46:16.379Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows", "MacOS", "Linux", "iOS", "Android" ], "product": "Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers", "vendor": "Zoom Communications Inc.", "versions": [ { "status": "affected", "version": "see references" } ] } ], "datePublic": "2024-11-12T13:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper input validation in some Zoom Apps may allow an unauthenticated user to conduct a disclosure of information via network access." } ], "value": "Improper input validation in some Zoom Apps may allow an unauthenticated user to conduct a disclosure of information via network access." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-252", "description": "CWE-252 Unchecked Return Value", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-19T19:28:48.335Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24041" } ], "source": { "discovery": "UNKNOWN" }, "title": "Zoom Apps - Improper Input Validation", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2024-45419", "datePublished": "2024-11-19T19:28:48.335Z", "dateReserved": "2024-08-28T21:50:25.332Z", "dateUpdated": "2024-11-19T21:46:16.379Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-27443 (GCVE-0-2025-27443)
Vulnerability from cvelistv5
Published
2025-04-08 16:16
Modified
2025-04-08 20:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-1188 - Insecure Default Initialization of Resource
Summary
Insecure default variable initialization in some Zoom Workplace Apps for Windows may allow an authenticated user to conduct a loss of integrity via local access.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Communications, Inc | Zoom Workplace Apps for Windows |
Version: See references. < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-27443", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-08T20:32:03.387603Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-08T20:32:12.324Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Zoom Workplace Apps for Windows", "vendor": "Zoom Communications, Inc", "versions": [ { "status": "affected", "version": "See references.", "versionType": "custom" } ] } ], "datePublic": "2025-04-08T12:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Insecure default variable initialization in some Zoom Workplace Apps for Windows may allow an authenticated user to conduct a loss of integrity via local access.\u003cbr\u003e\u003cbr\u003e" } ], "value": "Insecure default variable initialization in some Zoom Workplace Apps for Windows may allow an authenticated user to conduct a loss of integrity via local access." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.8, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1188", "description": "CWE-1188 Insecure Default Initialization of Resource", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-08T16:16:38.148Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-25014" } ], "source": { "discovery": "UNKNOWN" }, "title": "Zoom Workplace Apps for Windows - Insecure Default Variable Initialization", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2025-27443", "datePublished": "2025-04-08T16:16:38.148Z", "dateReserved": "2025-02-25T18:35:04.401Z", "dateUpdated": "2025-04-08T20:32:12.324Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-42434 (GCVE-0-2024-42434)
Vulnerability from cvelistv5
Published
2024-08-14 16:39
Modified
2024-08-15 13:36
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Summary
Sensitive information disclosure in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow a privileged user to conduct an information disclosure via network access.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Communications Inc. | Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers |
Version: see references |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-42434", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-15T13:36:35.542410Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-15T13:36:48.396Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows", "MacOS", "Linux", "iOS", "Android" ], "product": "Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers", "vendor": "Zoom Communications Inc.", "versions": [ { "status": "affected", "version": "see references" } ] } ], "datePublic": "2024-08-13T12:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Sensitive information disclosure in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow a privileged user to conduct an information disclosure via network access." } ], "value": "Sensitive information disclosure in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow a privileged user to conduct an information disclosure via network access." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-14T16:39:38.167Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24030" } ], "source": { "discovery": "UNKNOWN" }, "title": "Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers - Sensitive Information Exposure", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2024-42434", "datePublished": "2024-08-14T16:39:38.167Z", "dateReserved": "2024-08-01T19:13:16.137Z", "dateUpdated": "2024-08-15T13:36:48.396Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-30671 (GCVE-0-2025-30671)
Vulnerability from cvelistv5
Published
2025-04-08 16:21
Modified
2025-04-08 20:14
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-476 - NULL Pointer Dereference
Summary
Null pointer dereference in some Zoom Workplace Apps for Windows may allow an authenticated user to conduct a denial of service via network access.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Communications, Inc | Zoom Workplace Apps for Windows |
Version: See references. < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-30671", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-08T20:13:46.501245Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-08T20:14:04.268Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Zoom Workplace Apps for Windows", "vendor": "Zoom Communications, Inc", "versions": [ { "status": "affected", "version": "See references.", "versionType": "custom" } ] } ], "datePublic": "2025-04-08T12:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Null pointer dereference in some Zoom Workplace Apps for Windows may allow an authenticated user to conduct a denial of service via network access.\u003cbr\u003e" } ], "value": "Null pointer dereference in some Zoom Workplace Apps for Windows may allow an authenticated user to conduct a denial of service via network access." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-08T16:21:01.713Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-25015" } ], "source": { "discovery": "UNKNOWN" }, "title": "Zoom Workplace Apps for Windows - Null Pointer", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2025-30671", "datePublished": "2025-04-08T16:21:01.713Z", "dateReserved": "2025-03-24T22:35:25.476Z", "dateUpdated": "2025-04-08T20:14:04.268Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-45424 (GCVE-0-2024-45424)
Vulnerability from cvelistv5
Published
2025-02-25 19:34
Modified
2025-02-25 19:39
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-840 - Business Logic Error ()
Summary
Business logic error in some Zoom Workplace Apps may allow an unauthenticated user to conduct a disclosure of information via network access.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Communications, Inc | Zoom Workplace Apps |
Version: See references |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-45424", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-25T19:39:43.988523Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-25T19:39:53.249Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows", "MacOS", "Linux", "iOS", "Android" ], "product": "Zoom Workplace Apps", "vendor": "Zoom Communications, Inc", "versions": [ { "status": "affected", "version": "See references" } ] } ], "datePublic": "2024-09-10T12:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Business logic error in some Zoom Workplace Apps may allow an unauthenticated user to conduct a disclosure of information via network access." } ], "value": "Business logic error in some Zoom Workplace Apps may allow an unauthenticated user to conduct a disclosure of information via network access." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-840", "description": "Business Logic Error (CWE-840)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-25T19:34:24.811Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24036/" } ], "source": { "discovery": "UNKNOWN" }, "title": "Zoom Workplace Apps - Business Logic Error", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2024-45424", "datePublished": "2025-02-25T19:34:24.811Z", "dateReserved": "2024-08-28T21:50:25.333Z", "dateUpdated": "2025-02-25T19:39:53.249Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-42438 (GCVE-0-2024-42438)
Vulnerability from cvelistv5
Published
2024-08-14 16:41
Modified
2024-08-16 20:05
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-122 - Heap-based Buffer Overflow
Summary
Buffer overflow in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow an authenticated user to conduct a denial of service via network access.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Communications Inc. | Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers |
Version: see references |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-42438", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-16T20:04:49.519001Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-16T20:05:07.811Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows", "MacOS", "Linux", "iOS", "Android" ], "product": "Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers", "vendor": "Zoom Communications Inc.", "versions": [ { "status": "affected", "version": "see references" } ] } ], "datePublic": "2024-08-13T12:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Buffer overflow in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow an authenticated user to conduct a denial of service via network access." } ], "value": "Buffer overflow in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow an authenticated user to conduct a denial of service via network access." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122 Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-14T16:41:18.732Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24031" } ], "source": { "discovery": "UNKNOWN" }, "title": "Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers - Buffer Overflow", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2024-42438", "datePublished": "2024-08-14T16:41:18.732Z", "dateReserved": "2024-08-01T19:13:16.137Z", "dateUpdated": "2024-08-16T20:05:07.811Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-0144 (GCVE-0-2025-0144)
Vulnerability from cvelistv5
Published
2025-01-30 19:44
Modified
2025-01-30 21:29
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-787 - Out-of-bounds Write
Summary
Out-of-bounds write in some Zoom Workplace Apps may allow an authorized user to conduct a loss of integrity via network access.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Communications, Inc | Zoom Workplace Apps |
Version: see references < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-0144", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-30T21:29:34.343068Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-30T21:29:47.382Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Linux", "MacOS", "Windows", "iOS", "Android" ], "product": "Zoom Workplace Apps", "vendor": "Zoom Communications, Inc", "versions": [ { "status": "affected", "version": "see references", "versionType": "custom" } ] } ], "datePublic": "2025-01-14T13:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cb\u003e\u003cspan style=\"background-color: transparent;\"\u003eOut-of-bounds write in some Zoom Workplace Apps may allow an authorized user to conduct a loss of integrity via network access.\u003cbr\u003e\u003c/span\u003e\u003c/b\u003e" } ], "value": "Out-of-bounds write in some Zoom Workplace Apps may allow an authorized user to conduct a loss of integrity via network access." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-30T19:44:06.908Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-25003/" } ], "source": { "discovery": "UNKNOWN" }, "title": "Zoom Workplace Apps - Out-of-bounds Write", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2025-0144", "datePublished": "2025-01-30T19:44:06.908Z", "dateReserved": "2024-12-23T21:42:52.889Z", "dateUpdated": "2025-01-30T21:29:47.382Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-0145 (GCVE-0-2025-0145)
Vulnerability from cvelistv5
Published
2025-01-30 19:45
Modified
2025-01-30 21:23
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-426 - Untrusted Search Path
Summary
Untrusted search path in the installer for some Zoom Workplace Apps for Windows may allow an authorized user to conduct an escalation of privilege via local access.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Communications, Inc | Zoom Workplace Apps for Windows |
Version: see references < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-0145", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-30T21:23:14.886270Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-30T21:23:22.776Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Zoom Workplace Apps for Windows", "vendor": "Zoom Communications, Inc", "versions": [ { "status": "affected", "version": "see references", "versionType": "custom" } ] } ], "datePublic": "2025-01-14T13:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cb\u003e\u003cspan style=\"background-color: transparent;\"\u003eUntrusted search path in the installer for some Zoom Workplace Apps for Windows may allow an authorized user to conduct an escalation of privilege via local access.\u003cbr\u003e\u003cbr\u003e\u003c/span\u003e\u003c/b\u003e" } ], "value": "Untrusted search path in the installer for some Zoom Workplace Apps for Windows may allow an authorized user to conduct an escalation of privilege via local access." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-426", "description": "CWE-426 Untrusted Search Path", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-30T19:45:39.432Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-25004/" } ], "source": { "discovery": "UNKNOWN" }, "title": "Zoom Workplace Apps for Windows - Untrusted Search Path", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2025-0145", "datePublished": "2025-01-30T19:45:39.432Z", "dateReserved": "2024-12-23T21:42:54.089Z", "dateUpdated": "2025-01-30T21:23:22.776Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-42436 (GCVE-0-2024-42436)
Vulnerability from cvelistv5
Published
2024-08-14 16:41
Modified
2024-08-14 18:25
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-122 - Heap-based Buffer Overflow
Summary
Buffer overflow in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow an authenticated user to conduct a denial of service via network access.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Communications Inc. | Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers |
Version: see references |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-42436", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-14T18:25:38.974048Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-14T18:25:52.686Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows", "MacOS", "Linux", "iOS", "Android" ], "product": "Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers", "vendor": "Zoom Communications Inc.", "versions": [ { "status": "affected", "version": "see references" } ] } ], "datePublic": "2024-08-13T12:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Buffer overflow in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow an authenticated user to conduct a denial of service via network access." } ], "value": "Buffer overflow in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow an authenticated user to conduct a denial of service via network access." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122 Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-14T16:41:03.844Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24031" } ], "source": { "discovery": "UNKNOWN" }, "title": "Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers - Buffer Overflow", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2024-42436", "datePublished": "2024-08-14T16:41:03.844Z", "dateReserved": "2024-08-01T19:13:16.137Z", "dateUpdated": "2024-08-14T18:25:52.686Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-45420 (GCVE-0-2024-45420)
Vulnerability from cvelistv5
Published
2024-11-19 19:32
Modified
2024-11-20 15:16
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-400 - Uncontrolled Resource Consumption
Summary
Uncontrolled resource consumption in some Zoom Apps before version 6.2.0 may allow an authenticated user to conduct a denial of service via network access.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Communications Inc. | Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers |
Version: see references |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-45420", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-20T15:11:13.010896Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-20T15:16:27.856Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows", "MacOS", "Linux", "iOS", "Android" ], "product": "Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers", "vendor": "Zoom Communications Inc.", "versions": [ { "status": "affected", "version": "see references" } ] } ], "datePublic": "2024-11-12T13:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(247, 247, 248);\"\u003eUncontrolled resource consumption in some Zoom Apps before version 6.2.0 may allow an authenticated user to conduct a denial of service via network access.\u003c/span\u003e\u003cbr\u003e" } ], "value": "Uncontrolled resource consumption in some Zoom Apps before version 6.2.0 may allow an authenticated user to conduct a denial of service via network access." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400 Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-19T19:32:02.656Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24042" } ], "source": { "discovery": "UNKNOWN" }, "title": "Zoom Apps - Uncontrolled Resource Consumption", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2024-45420", "datePublished": "2024-11-19T19:32:02.656Z", "dateReserved": "2024-08-28T21:50:25.332Z", "dateUpdated": "2024-11-20T15:16:27.856Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-45422 (GCVE-0-2024-45422)
Vulnerability from cvelistv5
Published
2024-11-19 19:45
Modified
2024-11-20 15:42
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-20 - Improper Input Validation
Summary
Improper input validation in some Zoom Apps before version 6.2.0 may allow an unauthenticated user to conduct a denial of service via network access.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Communications Inc. | Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers |
Version: see references |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:zoom:workplace_app:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "workplace_app", "vendor": "zoom", "versions": [ { "lessThan": "6.2.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:zoom:meeting_sdk:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "meeting_sdk", "vendor": "zoom", "versions": [ { "lessThan": "6.2.0", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-45422", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-20T15:34:52.055891Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-20T15:42:40.830Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows", "MacOS", "Linux", "iOS", "Android" ], "product": "Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers", "vendor": "Zoom Communications Inc.", "versions": [ { "status": "affected", "version": "see references" } ] } ], "datePublic": "2024-11-12T13:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper input validation in some Zoom Apps before version 6.2.0 may allow an unauthenticated user to conduct a denial of service via network access." } ], "value": "Improper input validation in some Zoom Apps before version 6.2.0 may allow an unauthenticated user to conduct a denial of service via network access." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-19T19:45:25.914Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24044" } ], "source": { "discovery": "UNKNOWN" }, "title": "Zoom Apps - Improper Input Validation", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2024-45422", "datePublished": "2024-11-19T19:45:25.914Z", "dateReserved": "2024-08-28T21:50:25.332Z", "dateUpdated": "2024-11-20T15:42:40.830Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-42437 (GCVE-0-2024-42437)
Vulnerability from cvelistv5
Published
2024-08-14 16:41
Modified
2024-08-14 17:44
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-122 - Heap-based Buffer Overflow
Summary
Buffer overflow in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow an authenticated user to conduct a denial of service via network access.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Communications Inc. | Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers |
Version: see references |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-42437", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-14T17:34:09.873943Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-14T17:44:29.139Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows", "MacOS", "Linux", "iOS", "Android" ], "product": "Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers", "vendor": "Zoom Communications Inc.", "versions": [ { "status": "affected", "version": "see references" } ] } ], "datePublic": "2024-08-13T12:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Buffer overflow in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow an authenticated user to conduct a denial of service via network access." } ], "value": "Buffer overflow in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow an authenticated user to conduct a denial of service via network access." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122 Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-14T16:41:12.866Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24031" } ], "source": { "discovery": "UNKNOWN" }, "title": "Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers - Buffer Overflow", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2024-42437", "datePublished": "2024-08-14T16:41:12.866Z", "dateReserved": "2024-08-01T19:13:16.137Z", "dateUpdated": "2024-08-14T17:44:29.139Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-45426 (GCVE-0-2024-45426)
Vulnerability from cvelistv5
Published
2025-02-25 19:39
Modified
2025-02-26 16:49
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-708 - Incorrect Ownership Assignment
Summary
Incorrect ownership assignment in some Zoom Workplace Apps may allow a privileged user to conduct an information disclosure via network access.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Communications, Inc | Zoom Workplace Apps |
Version: See references |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-45426", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-26T16:49:09.744526Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-26T16:49:25.061Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows", "MacOS", "Linux", "iOS", "Android" ], "product": "Zoom Workplace Apps", "vendor": "Zoom Communications, Inc", "versions": [ { "status": "affected", "version": "See references" } ] } ], "datePublic": "2024-10-08T12:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Incorrect ownership assignment in some Zoom Workplace Apps may allow a privileged user to conduct an information disclosure via network access.\u003cbr\u003e" } ], "value": "Incorrect ownership assignment in some Zoom Workplace Apps may allow a privileged user to conduct an information disclosure via network access." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-708", "description": "CWE-708: Incorrect Ownership Assignment", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-25T19:39:48.596Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24038/" } ], "source": { "discovery": "UNKNOWN" }, "title": "Zoom Workplace Apps - Incorrect Ownership Assignment", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2024-45426", "datePublished": "2025-02-25T19:39:48.596Z", "dateReserved": "2024-08-28T21:50:25.333Z", "dateUpdated": "2025-02-26T16:49:25.061Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-45425 (GCVE-0-2024-45425)
Vulnerability from cvelistv5
Published
2025-02-25 19:38
Modified
2025-02-26 16:57
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-286 - Incorrect User Management
Summary
Incorrect user management in some Zoom Workplace Apps may allow a privileged user to conduct an information disclosure via network access.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Communications, Inc | Zoom Workplace Apps |
Version: See references |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-45425", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-26T16:55:06.643915Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-26T16:57:20.637Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows", "MacOS", "Linux", "iOS", "Android" ], "product": "Zoom Workplace Apps", "vendor": "Zoom Communications, Inc", "versions": [ { "status": "affected", "version": "See references" } ] } ], "datePublic": "2024-09-10T12:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Incorrect user management in some Zoom Workplace Apps may allow a privileged user to conduct an information disclosure via network access.\u003cbr\u003e\u003cbr\u003e" } ], "value": "Incorrect user management in some Zoom Workplace Apps may allow a privileged user to conduct an information disclosure via network access." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-286", "description": "CWE-286 Incorrect User Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-25T19:38:02.925Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24037/" } ], "source": { "discovery": "UNKNOWN" }, "title": "Zoom Workplace Apps - Incorrect User Management", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2024-45425", "datePublished": "2025-02-25T19:38:02.925Z", "dateReserved": "2024-08-28T21:50:25.333Z", "dateUpdated": "2025-02-26T16:57:20.637Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-30665 (GCVE-0-2025-30665)
Vulnerability from cvelistv5
Published
2025-05-14 17:35
Modified
2025-05-14 19:00
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-476 - NULL Pointer Dereference
Summary
NULL pointer dereference in some Zoom Workplace Apps for Windows may allow an authenticated user to conduct a denial of service via network access.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Communications, Inc | Zoom Workplace Apps for Windows |
Version: see references |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-30665", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-14T18:01:35.450813Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-14T19:00:31.446Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Zoom Workplace Apps for Windows", "vendor": "Zoom Communications, Inc", "versions": [ { "status": "affected", "version": "see references" } ] } ], "datePublic": "2025-05-13T12:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "NULL pointer dereference in some Zoom Workplace Apps for Windows may allow an authenticated user to conduct a denial of service via network access.\u003cbr\u003e" } ], "value": "NULL pointer dereference in some Zoom Workplace Apps for Windows may allow an authenticated user to conduct a denial of service via network access." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-14T17:35:06.968Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-25018" } ], "source": { "discovery": "UNKNOWN" }, "title": "Zoom Workplace Apps for Windows - NULL Pointer Dereference", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2025-30665", "datePublished": "2025-05-14T17:35:06.968Z", "dateReserved": "2025-03-24T22:35:25.475Z", "dateUpdated": "2025-05-14T19:00:31.446Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2024-08-14 17:15
Modified
2024-08-29 00:01
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
Buffer overflow in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow an authenticated user to conduct a denial of service via network access.
References
▶ | URL | Tags | |
---|---|---|---|
security@zoom.us | https://www.zoom.com/en/trust/security-bulletin/zsb-24031 | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:android:*:*", "matchCriteriaId": "CCF91C03-5DC9-4AC5-AB5F-36708AD86A97", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "6E039542-3E10-4565-9543-71F50F06A933", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:macos:*:*", "matchCriteriaId": "8629FE9D-2BFF-44F5-8E66-2702BD92E2E5", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:windows:*:*", "matchCriteriaId": "F82C8A03-C83C-4404-84C1-D9D4836B9982", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:ipados:*:*", "matchCriteriaId": "9A8F4501-FF62-4C1B-9232-875D6B09B509", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:macos:*:*", "matchCriteriaId": "30C8F150-F275-423E-818C-B15B929FA006", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:windows:*:*", "matchCriteriaId": "242D5F39-22FC-4304-8F36-3A0A23BDCC6E", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:android:*:*", "matchCriteriaId": "603C3411-C4F4-4451-BA4B-C463EC11C707", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:linux:*:*", "matchCriteriaId": "A1D900AF-A23B-4D1C-BDE3-CE99DFFBDEBB", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:macos:*:*", "matchCriteriaId": "B497C5C3-921E-462B-91A3-58DA2F669236", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:windows:*:*", "matchCriteriaId": "D40263F3-4A0E-418E-AF91-8AD20A957D9F", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace:*:*:*:*:*:android:*:*", "matchCriteriaId": "2C19D307-3FE4-40A2-BEE6-C04B71597D50", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "8FE458E6-5ACB-428D-A339-D826E5EDDAD1", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:linux:*:*", "matchCriteriaId": "65DD163F-BB0E-4BE3-9545-F379774F3AE4", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:macos:*:*", "matchCriteriaId": "29182D36-6FB9-4340-A6B9-F6F81FE57443", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:windows:*:*", "matchCriteriaId": "3A34FEBC-6E74-4F03-BFA7-FD37226097F1", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_virtual_desktop_infrastructure:*:*:*:*:*:windows:*:*", "matchCriteriaId": "E725630A-E7C2-4C15-BFFA-50EE34D3EE68", "versionEndExcluding": "5.17.14", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_virtual_desktop_infrastructure:*:*:*:*:*:windows:*:*", "matchCriteriaId": "61AC2191-2286-4328-9E4E-2C78E1D37734", "versionEndExcluding": "6.0.11", "versionStartIncluding": "6.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow an authenticated user to conduct a denial of service via network access." }, { "lang": "es", "value": " El desbordamiento del b\u00fafer en algunas aplicaciones, SDK, clientes de salas y controladores de salas de Zoom Workplace puede permitir que un usuario autenticado realice una denegaci\u00f3n de servicio a trav\u00e9s del acceso a la red." } ], "id": "CVE-2024-42438", "lastModified": "2024-08-29T00:01:59.503", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-08-14T17:15:17.317", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24031" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-122" } ], "source": "security@zoom.us", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-05-14 18:15
Modified
2025-08-05 13:43
Severity ?
Summary
NULL pointer dereference in some Zoom Workplace Apps for Windows may allow an authenticated user to conduct a denial of service via network access.
References
▶ | URL | Tags | |
---|---|---|---|
security@zoom.us | https://www.zoom.com/en/trust/security-bulletin/zsb-25018 | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:windows:*:*", "matchCriteriaId": "A3D5AD71-8BC5-4346-B8B2-1166AD0415FF", "versionEndExcluding": "6.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:windows:*:*", "matchCriteriaId": "390D202B-A60A-411E-8A57-0AF1C2BB0497", "versionEndExcluding": "6.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:windows:*:*", "matchCriteriaId": "A117F0E2-8079-41C5-B619-D9059A3120E4", "versionEndExcluding": "6.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:windows:*:*", "matchCriteriaId": "63C6EF40-B762-4FE8-83AA-D9D4600A5C92", "versionEndExcluding": "6.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_virtual_desktop_infrastructure:*:*:*:*:*:windows:*:*", "matchCriteriaId": "B4CF0315-8092-424B-9254-05FF6DDDA029", "versionEndExcluding": "6.1.17", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_virtual_desktop_infrastructure:*:*:*:*:*:windows:*:*", "matchCriteriaId": "71A0CC0D-D415-46DB-B566-DB7C41A6E277", "versionEndExcluding": "6.2.13", "versionStartIncluding": "6.1.18", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_virtual_desktop_infrastructure:*:*:*:*:*:windows:*:*", "matchCriteriaId": "D2276405-3395-4252-A140-06C9A9BDBCDB", "versionEndExcluding": "6.3.10", "versionStartIncluding": "6.2.14", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "NULL pointer dereference in some Zoom Workplace Apps for Windows may allow an authenticated user to conduct a denial of service via network access." }, { "lang": "es", "value": "La desreferencia de puntero NULL en algunas aplicaciones de Zoom Workplace para Windows puede permitir que un usuario autenticado realice una denegaci\u00f3n de servicio a trav\u00e9s del acceso a la red." } ], "id": "CVE-2025-30666", "lastModified": "2025-08-05T13:43:02.117", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "security@zoom.us", "type": "Secondary" } ] }, "published": "2025-05-14T18:15:30.447", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-25018" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "security@zoom.us", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2024-08-14 17:15
Modified
2024-09-04 21:39
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
Buffer overflow in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow an authenticated user to conduct a denial of service via network access.
References
▶ | URL | Tags | |
---|---|---|---|
security@zoom.us | https://www.zoom.com/en/trust/security-bulletin/zsb-24031 | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:android:*:*", "matchCriteriaId": "CCF91C03-5DC9-4AC5-AB5F-36708AD86A97", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "6E039542-3E10-4565-9543-71F50F06A933", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:macos:*:*", "matchCriteriaId": "8629FE9D-2BFF-44F5-8E66-2702BD92E2E5", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:windows:*:*", "matchCriteriaId": "F82C8A03-C83C-4404-84C1-D9D4836B9982", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:ipados:*:*", "matchCriteriaId": "9A8F4501-FF62-4C1B-9232-875D6B09B509", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:macos:*:*", "matchCriteriaId": "30C8F150-F275-423E-818C-B15B929FA006", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:windows:*:*", "matchCriteriaId": "242D5F39-22FC-4304-8F36-3A0A23BDCC6E", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:android:*:*", "matchCriteriaId": "603C3411-C4F4-4451-BA4B-C463EC11C707", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:linux:*:*", "matchCriteriaId": "A1D900AF-A23B-4D1C-BDE3-CE99DFFBDEBB", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:macos:*:*", "matchCriteriaId": "B497C5C3-921E-462B-91A3-58DA2F669236", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:windows:*:*", "matchCriteriaId": "D40263F3-4A0E-418E-AF91-8AD20A957D9F", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace:*:*:*:*:*:android:*:*", "matchCriteriaId": "2C19D307-3FE4-40A2-BEE6-C04B71597D50", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "8FE458E6-5ACB-428D-A339-D826E5EDDAD1", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:linux:*:*", "matchCriteriaId": "65DD163F-BB0E-4BE3-9545-F379774F3AE4", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:macos:*:*", "matchCriteriaId": "29182D36-6FB9-4340-A6B9-F6F81FE57443", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:windows:*:*", "matchCriteriaId": "3A34FEBC-6E74-4F03-BFA7-FD37226097F1", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_virtual_desktop_infrastructure:*:*:*:*:*:windows:*:*", "matchCriteriaId": "E725630A-E7C2-4C15-BFFA-50EE34D3EE68", "versionEndExcluding": "5.17.14", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_virtual_desktop_infrastructure:*:*:*:*:*:windows:*:*", "matchCriteriaId": "61AC2191-2286-4328-9E4E-2C78E1D37734", "versionEndExcluding": "6.0.11", "versionStartIncluding": "6.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow an authenticated user to conduct a denial of service via network access." }, { "lang": "es", "value": " El desbordamiento del b\u00fafer en algunas aplicaciones, SDK, clientes de salas y controladores de salas de Zoom Workplace puede permitir que un usuario autenticado realice una denegaci\u00f3n de servicio a trav\u00e9s del acceso a la red." } ], "id": "CVE-2024-42437", "lastModified": "2024-09-04T21:39:02.570", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-08-14T17:15:17.047", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24031" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-122" } ], "source": "security@zoom.us", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-02-25 20:15
Modified
2025-03-05 13:54
Severity ?
4.9 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
Incorrect user management in some Zoom Workplace Apps may allow a privileged user to conduct an information disclosure via network access.
References
▶ | URL | Tags | |
---|---|---|---|
security@zoom.us | https://www.zoom.com/en/trust/security-bulletin/zsb-24037/ | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:android:*:*", "matchCriteriaId": "CCF91C03-5DC9-4AC5-AB5F-36708AD86A97", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "6E039542-3E10-4565-9543-71F50F06A933", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:linux:*:*", "matchCriteriaId": "BAB2DBC4-95E2-47D1-A343-12A09D3E9D38", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:macos:*:*", "matchCriteriaId": "8629FE9D-2BFF-44F5-8E66-2702BD92E2E5", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:windows:*:*", "matchCriteriaId": "F82C8A03-C83C-4404-84C1-D9D4836B9982", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:ipad_os:*:*", "matchCriteriaId": "23B5BD12-AA42-47A8-9BC7-5F59B48160C9", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:windows:*:*", "matchCriteriaId": "242D5F39-22FC-4304-8F36-3A0A23BDCC6E", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:android:*:*", "matchCriteriaId": "603C3411-C4F4-4451-BA4B-C463EC11C707", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "F9BEC072-28D9-4F55-B47D-E7EF1298CA6F", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:linux:*:*", "matchCriteriaId": "A1D900AF-A23B-4D1C-BDE3-CE99DFFBDEBB", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:macos:*:*", "matchCriteriaId": "B497C5C3-921E-462B-91A3-58DA2F669236", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:windows:*:*", "matchCriteriaId": "D40263F3-4A0E-418E-AF91-8AD20A957D9F", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace:*:*:*:*:*:android:*:*", "matchCriteriaId": "2C19D307-3FE4-40A2-BEE6-C04B71597D50", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "8FE458E6-5ACB-428D-A339-D826E5EDDAD1", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:linux:*:*", "matchCriteriaId": "65DD163F-BB0E-4BE3-9545-F379774F3AE4", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:macos:*:*", "matchCriteriaId": "29182D36-6FB9-4340-A6B9-F6F81FE57443", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:windows:*:*", "matchCriteriaId": "3A34FEBC-6E74-4F03-BFA7-FD37226097F1", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_virtual_desktop_infrastructure:*:*:*:*:*:windows:*:*", "matchCriteriaId": "22369469-1A7D-4130-B5AE-E76F31405B94", "versionEndExcluding": "6.1.10", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect user management in some Zoom Workplace Apps may allow a privileged user to conduct an information disclosure via network access." }, { "lang": "es", "value": "La gesti\u00f3n incorrecta de usuarios en algunas aplicaciones de Zoom Workplace puede permitir que un usuario privilegiado realice una divulgaci\u00f3n de informaci\u00f3n a trav\u00e9s del acceso a la red." } ], "id": "CVE-2024-45425", "lastModified": "2025-03-05T13:54:29.030", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 3.6, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-02-25T20:15:35.753", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24037/" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-286" } ], "source": "security@zoom.us", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-11-19 20:15
Modified
2025-08-19 14:08
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
Improper input validation in some Zoom Apps before version 6.2.0 may allow an unauthenticated user to conduct a denial of service via network access.
References
▶ | URL | Tags | |
---|---|---|---|
security@zoom.us | https://www.zoom.com/en/trust/security-bulletin/zsb-24044 | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:android:*:*", "matchCriteriaId": "FDAC7DED-7124-49DC-81FE-3A846C6FAC6B", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "8E8DDD36-808D-4864-AA07-0760E4375FCA", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:linux:*:*", "matchCriteriaId": "49957FA5-35FF-40AC-B88E-A235FA00F639", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:macos:*:*", "matchCriteriaId": "B02E0B95-F342-4D19-9C56-0ED458942E09", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:windows:*:*", "matchCriteriaId": "6398CA4B-4E28-4004-A5AA-0FBFAC5D2D13", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:ipados:*:*", "matchCriteriaId": "A3484384-C52C-41FF-91FC-5D0A2227CD83", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:macos:*:*", "matchCriteriaId": "05EFB308-185E-41CD-9E1F-A6EAB1BE3314", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:windows:*:*", "matchCriteriaId": "7AC5BD11-4FF8-4BEA-9151-75E165750703", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:android:*:*", "matchCriteriaId": "8DF64BAE-8FB5-4FB1-AA60-F34DA38B7882", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:linux:*:*", "matchCriteriaId": "7C050E43-5F66-4F82-8725-6D4F86C2D7FC", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:macos:*:*", "matchCriteriaId": "78CF87EF-1F6A-4059-AA3F-C9EFAB6311E4", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:windows:*:*", "matchCriteriaId": "0E9FA665-AB32-4140-91F9-57E2EA14D837", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:android:*:*", "matchCriteriaId": "F7D73FAD-D117-46F1-A30F-B373103576BB", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "1615D4AC-42A1-4A37-80E8-DD312EF7D9D3", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:linux:*:*", "matchCriteriaId": "C11934B8-2EFA-4274-ADAD-53447B0BC972", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:macos:*:*", "matchCriteriaId": "70AEFFD5-918F-4046-9856-C665C2DEF4C4", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:windows:*:*", "matchCriteriaId": "F18288EB-7820-4C47-A589-BF3DA06A75C0", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace:*:*:*:*:*:android:*:*", "matchCriteriaId": "39EF83F4-626A-43F1-9312-147F65B1EC5E", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "21D7D4E9-14DF-48CF-A9F9-A61408B59789", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:linux:*:*", "matchCriteriaId": "655AC669-B03B-4BDD-B578-F6F02FAD857E", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:macos:*:*", "matchCriteriaId": "8A311271-1418-4E8C-90B5-960E37592BAE", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:windows:*:*", "matchCriteriaId": "F401A8C2-F0DF-4EC9-B0C2-11D9EB1BED15", "versionEndExcluding": "6.2.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper input validation in some Zoom Apps before version 6.2.0 may allow an unauthenticated user to conduct a denial of service via network access." }, { "lang": "es", "value": "La validaci\u00f3n de entrada incorrecta en algunas aplicaciones de Zoom anteriores a la versi\u00f3n 6.2.0 puede permitir que un usuario no autenticado realice una denegaci\u00f3n de servicio a trav\u00e9s del acceso a la red." } ], "id": "CVE-2024-45422", "lastModified": "2025-08-19T14:08:46.097", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 2.5, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-11-19T20:15:31.430", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24044" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "security@zoom.us", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-08-14 17:15
Modified
2024-09-04 21:38
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
Buffer overflow in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow an authenticated user to conduct a denial of service via network access.
References
▶ | URL | Tags | |
---|---|---|---|
security@zoom.us | https://www.zoom.com/en/trust/security-bulletin/zsb-24031 | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:android:*:*", "matchCriteriaId": "CCF91C03-5DC9-4AC5-AB5F-36708AD86A97", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "6E039542-3E10-4565-9543-71F50F06A933", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:macos:*:*", "matchCriteriaId": "8629FE9D-2BFF-44F5-8E66-2702BD92E2E5", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:windows:*:*", "matchCriteriaId": "F82C8A03-C83C-4404-84C1-D9D4836B9982", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:ipados:*:*", "matchCriteriaId": "9A8F4501-FF62-4C1B-9232-875D6B09B509", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:macos:*:*", "matchCriteriaId": "30C8F150-F275-423E-818C-B15B929FA006", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:windows:*:*", "matchCriteriaId": "242D5F39-22FC-4304-8F36-3A0A23BDCC6E", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:android:*:*", "matchCriteriaId": "603C3411-C4F4-4451-BA4B-C463EC11C707", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:linux:*:*", "matchCriteriaId": "A1D900AF-A23B-4D1C-BDE3-CE99DFFBDEBB", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:macos:*:*", "matchCriteriaId": "B497C5C3-921E-462B-91A3-58DA2F669236", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:windows:*:*", "matchCriteriaId": "D40263F3-4A0E-418E-AF91-8AD20A957D9F", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace:*:*:*:*:*:android:*:*", "matchCriteriaId": "2C19D307-3FE4-40A2-BEE6-C04B71597D50", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "8FE458E6-5ACB-428D-A339-D826E5EDDAD1", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:linux:*:*", "matchCriteriaId": "65DD163F-BB0E-4BE3-9545-F379774F3AE4", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:macos:*:*", "matchCriteriaId": "29182D36-6FB9-4340-A6B9-F6F81FE57443", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:windows:*:*", "matchCriteriaId": "3A34FEBC-6E74-4F03-BFA7-FD37226097F1", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_virtual_desktop_infrastructure:*:*:*:*:*:windows:*:*", "matchCriteriaId": "E725630A-E7C2-4C15-BFFA-50EE34D3EE68", "versionEndExcluding": "5.17.14", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_virtual_desktop_infrastructure:*:*:*:*:*:windows:*:*", "matchCriteriaId": "61AC2191-2286-4328-9E4E-2C78E1D37734", "versionEndExcluding": "6.0.11", "versionStartIncluding": "6.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow an authenticated user to conduct a denial of service via network access." }, { "lang": "es", "value": " El desbordamiento del b\u00fafer en algunas aplicaciones, SDK, clientes de salas y controladores de salas de Zoom Workplace puede permitir que un usuario autenticado realice una denegaci\u00f3n de servicio a trav\u00e9s del acceso a la red." } ], "id": "CVE-2024-42436", "lastModified": "2024-09-04T21:38:05.587", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-08-14T17:15:16.790", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24031" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-122" } ], "source": "security@zoom.us", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-01-30 20:15
Modified
2025-08-20 12:38
Severity ?
4.6 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:L
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Untrusted search path in the installer for some Zoom Workplace Apps for Windows may allow an authorized user to conduct an escalation of privilege via local access.
References
▶ | URL | Tags | |
---|---|---|---|
security@zoom.us | https://www.zoom.com/en/trust/security-bulletin/zsb-25004/ | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:windows:*:*", "matchCriteriaId": "A98C293E-D615-4807-B5D6-D3EACF6C2E5A", "versionEndExcluding": "6.2.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:windows:*:*", "matchCriteriaId": "5369DF52-B7F8-45BF-B431-747DFA54CF1E", "versionEndExcluding": "6.2.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:windows:*:*", "matchCriteriaId": "F57C8F45-FAE2-486D-83F4-0E938B62CBDB", "versionEndExcluding": "6.2.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:windows:*:*", "matchCriteriaId": "1126B8E5-38A9-4E00-9103-6C4EFDE6D60C", "versionEndExcluding": "6.2.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:windows:*:*", "matchCriteriaId": "6FC0F189-0F60-4EAB-9C35-0A62F06BFAC4", "versionEndExcluding": "6.2.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_virtual_desktop_infrastructure:*:*:*:*:*:windows:*:*", "matchCriteriaId": "645FDC99-C05E-4819-AA55-F9A80A98F567", "versionEndExcluding": "6.0.15", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_virtual_desktop_infrastructure:*:*:*:*:*:windows:*:*", "matchCriteriaId": "9E06D46C-AE61-4533-A8F7-6E6CA9830155", "versionEndExcluding": "6.1.13", "versionStartIncluding": "6.0.16", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Untrusted search path in the installer for some Zoom Workplace Apps for Windows may allow an authorized user to conduct an escalation of privilege via local access." }, { "lang": "es", "value": "La ruta de b\u00fasqueda no confiable en el instalador de algunas aplicaciones de Zoom Workplace para Windows puede permitir que un usuario autorizado realice una escalada de privilegios a trav\u00e9s del acceso local." } ], "id": "CVE-2025-0145", "lastModified": "2025-08-20T12:38:30.887", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 1.5, "impactScore": 2.7, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-01-30T20:15:34.547", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-25004/" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-426" } ], "source": "security@zoom.us", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2025-02-25 20:15
Modified
2025-03-05 13:53
Severity ?
8.5 (High) - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Buffer overflow in some Zoom Apps may allow an authenticated user to conduct an escalation of privilege via network access.
References
▶ | URL | Tags | |
---|---|---|---|
security@zoom.us | https://www.zoom.com/en/trust/security-bulletin/zsb-24043/ | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:android:*:*", "matchCriteriaId": "FDAC7DED-7124-49DC-81FE-3A846C6FAC6B", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "8E8DDD36-808D-4864-AA07-0760E4375FCA", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:linux:*:*", "matchCriteriaId": "49957FA5-35FF-40AC-B88E-A235FA00F639", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:macos:*:*", "matchCriteriaId": "B02E0B95-F342-4D19-9C56-0ED458942E09", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:windows:*:*", "matchCriteriaId": "6398CA4B-4E28-4004-A5AA-0FBFAC5D2D13", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:ipad_os:*:*", "matchCriteriaId": "0F555E18-C547-493A-A3C6-85D42B75C5C0", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:macos:*:*", "matchCriteriaId": "05EFB308-185E-41CD-9E1F-A6EAB1BE3314", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:windows:*:*", "matchCriteriaId": "7AC5BD11-4FF8-4BEA-9151-75E165750703", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:android:*:*", "matchCriteriaId": "8DF64BAE-8FB5-4FB1-AA60-F34DA38B7882", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:linux:*:*", "matchCriteriaId": "7C050E43-5F66-4F82-8725-6D4F86C2D7FC", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:macos:*:*", "matchCriteriaId": "78CF87EF-1F6A-4059-AA3F-C9EFAB6311E4", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:windows:*:*", "matchCriteriaId": "0E9FA665-AB32-4140-91F9-57E2EA14D837", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:android:*:*", "matchCriteriaId": "F7D73FAD-D117-46F1-A30F-B373103576BB", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "1615D4AC-42A1-4A37-80E8-DD312EF7D9D3", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:linux:*:*", "matchCriteriaId": "C11934B8-2EFA-4274-ADAD-53447B0BC972", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:macos:*:*", "matchCriteriaId": "70AEFFD5-918F-4046-9856-C665C2DEF4C4", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:windows:*:*", "matchCriteriaId": "F18288EB-7820-4C47-A589-BF3DA06A75C0", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace:*:*:*:*:*:android:*:*", "matchCriteriaId": "39EF83F4-626A-43F1-9312-147F65B1EC5E", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "21D7D4E9-14DF-48CF-A9F9-A61408B59789", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:linux:*:*", "matchCriteriaId": "655AC669-B03B-4BDD-B578-F6F02FAD857E", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:macos:*:*", "matchCriteriaId": "8A311271-1418-4E8C-90B5-960E37592BAE", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:windows:*:*", "matchCriteriaId": "F401A8C2-F0DF-4EC9-B0C2-11D9EB1BED15", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_virtual_desktop_infrastructure:*:*:*:*:*:windows:*:*", "matchCriteriaId": "A8EE3AB9-DE5E-4141-9974-C735AEEF1DF0", "versionEndExcluding": "6.1.12", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in some Zoom Apps may allow an authenticated user to conduct an escalation of privilege via network access." }, { "lang": "es", "value": "El desbordamiento del b\u00fafer en algunas aplicaciones de Zoom puede permitir que un usuario autenticado realice una escalada de privilegios a trav\u00e9s del acceso a la red." } ], "id": "CVE-2024-45421", "lastModified": "2025-03-05T13:53:35.033", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 6.0, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-02-25T20:15:35.400", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24043/" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-122" } ], "source": "security@zoom.us", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-01-30 20:15
Modified
2025-08-01 01:25
Severity ?
3.9 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L
5.0 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
5.0 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
Summary
Symlink following in the installer for Zoom Workplace App for macOS before 6.2.10 may allow an authenticated user to conduct a denial of service via local access.
References
▶ | URL | Tags | |
---|---|---|---|
security@zoom.us | https://www.zoom.com/en/trust/security-bulletin/zsb-25005/ | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zoom | meeting_software_development_kit | * | |
zoom | rooms | * | |
zoom | rooms_controller | * | |
zoom | video_software_development_kit | * | |
zoom | workplace_desktop | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:macos:*:*", "matchCriteriaId": "9626CBBF-7026-4D81-B9DA-19C51B6158AF", "versionEndExcluding": "6.2.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:macos:*:*", "matchCriteriaId": "8F50C67D-F5C5-4657-A412-543CDAA12044", "versionEndExcluding": "6.2.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:macos:*:*", "matchCriteriaId": "FB0BAA8F-B484-464E-A272-791F05D027BA", "versionEndExcluding": "6.2.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:macos:*:*", "matchCriteriaId": "FAC02888-2D6B-435D-9186-D11953AC680F", "versionEndExcluding": "6.2.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:macos:*:*", "matchCriteriaId": "0DC82EFB-CE1A-42CF-85A1-8D92E50BE782", "versionEndExcluding": "6.2.10", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Symlink following in the installer for Zoom Workplace App for macOS before 6.2.10 may allow an authenticated user to conduct a denial of service via local access." }, { "lang": "es", "value": "El enlace simb\u00f3lico que sigue en el instalador de la aplicaci\u00f3n Zoom Workplace para macOS anterior a la versi\u00f3n 6.2.10 puede permitir que un usuario autenticado realice una denegaci\u00f3n de servicio a trav\u00e9s del acceso local." } ], "id": "CVE-2025-0146", "lastModified": "2025-08-01T01:25:11.140", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.9, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 1.3, "impactScore": 2.5, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.3, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-01-30T20:15:34.907", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-25005/" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-59" } ], "source": "security@zoom.us", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2025-01-30 20:15
Modified
2025-08-20 12:36
Severity ?
3.1 (Low) - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Summary
Out-of-bounds write in some Zoom Workplace Apps may allow an authorized user to conduct a loss of integrity via network access.
References
▶ | URL | Tags | |
---|---|---|---|
security@zoom.us | https://www.zoom.com/en/trust/security-bulletin/zsb-25003/ | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:android:*:*", "matchCriteriaId": "24C34BE7-5D76-4269-BA59-A3F1D92AB89C", "versionEndExcluding": "6.2.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "0FDB317B-3796-4462-99FE-4F8EA64A2B21", "versionEndExcluding": "6.2.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:linux:*:*", "matchCriteriaId": "3C4F07D8-FB5B-4C94-965B-EA8303E79B0F", "versionEndExcluding": "6.2.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:macos:*:*", "matchCriteriaId": "4B61C9F0-CDD7-4843-A95B-35BB013EA52E", "versionEndExcluding": "6.2.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:windows:*:*", "matchCriteriaId": "A98C293E-D615-4807-B5D6-D3EACF6C2E5A", "versionEndExcluding": "6.2.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:ipados:*:*", "matchCriteriaId": "031A7405-7D8F-4C3C-A03C-9DB330BB8D7D", "versionEndExcluding": "6.2.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:macos:*:*", "matchCriteriaId": "B74B66FB-1F90-4922-AEE8-85E07FC1D604", "versionEndExcluding": "6.2.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:windows:*:*", "matchCriteriaId": "5369DF52-B7F8-45BF-B431-747DFA54CF1E", "versionEndExcluding": "6.2.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:android:*:*", "matchCriteriaId": "758E029E-C3E3-4F81-B916-63EEF2B52100", "versionEndExcluding": "6.2.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:linux:*:*", "matchCriteriaId": "80F51FE1-8F38-4623-90C0-1A5A3F674102", "versionEndExcluding": "6.2.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:macos:*:*", "matchCriteriaId": "89C3A3DC-84C0-467C-8F34-C63A497773B3", "versionEndExcluding": "6.2.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:windows:*:*", "matchCriteriaId": "F57C8F45-FAE2-486D-83F4-0E938B62CBDB", "versionEndExcluding": "6.2.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:android:*:*", "matchCriteriaId": "7CC34BFF-968F-4084-B381-D537295DD43B", "versionEndExcluding": "6.2.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "0BD54A14-0E43-45C7-9A06-F566A01A88B5", "versionEndExcluding": "6.2.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:linux:*:*", "matchCriteriaId": "6B97E992-19EB-4B47-A046-1C656E26349F", "versionEndExcluding": "6.2.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:macos:*:*", "matchCriteriaId": "697C24CB-BEF7-4305-A255-2E552F7D9012", "versionEndExcluding": "6.2.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:windows:*:*", "matchCriteriaId": "1126B8E5-38A9-4E00-9103-6C4EFDE6D60C", "versionEndExcluding": "6.2.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace:*:*:*:*:*:android:*:*", "matchCriteriaId": "9C0D8576-B9C5-4597-B41C-33369B3B574D", "versionEndExcluding": "6.2.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "DBBD2007-4200-485E-A7E4-88125182125F", "versionEndExcluding": "6.2.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:linux:*:*", "matchCriteriaId": "5ECF5B7E-9FEC-44AC-B122-E626F29A136D", "versionEndExcluding": "6.2.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:macos:*:*", "matchCriteriaId": "0E8C5ED8-5948-418B-B4E7-6D831368AF05", "versionEndExcluding": "6.2.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:windows:*:*", "matchCriteriaId": "6FC0F189-0F60-4EAB-9C35-0A62F06BFAC4", "versionEndExcluding": "6.2.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_virtual_desktop_infrastructure:*:*:*:*:*:windows:*:*", "matchCriteriaId": "645FDC99-C05E-4819-AA55-F9A80A98F567", "versionEndExcluding": "6.0.15", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_virtual_desktop_infrastructure:*:*:*:*:*:windows:*:*", "matchCriteriaId": "9E06D46C-AE61-4533-A8F7-6E6CA9830155", "versionEndExcluding": "6.1.13", "versionStartIncluding": "6.0.16", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Out-of-bounds write in some Zoom Workplace Apps may allow an authorized user to conduct a loss of integrity via network access." }, { "lang": "es", "value": "Fuera de los l\u00edmites la escritura en algunas aplicaciones de Zoom Workplace puede permitir que un usuario autorizado realice una p\u00e9rdida de integridad a trav\u00e9s del acceso a la red." } ], "id": "CVE-2025-0144", "lastModified": "2025-08-20T12:36:29.310", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 1.4, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-01-30T20:15:34.210", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-25003/" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "security@zoom.us", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2025-04-08 17:15
Modified
2025-08-01 19:07
Severity ?
Summary
Null pointer dereference in some Zoom Workplace Apps for Windows may allow an authenticated user to conduct a denial of service via network access.
References
▶ | URL | Tags | |
---|---|---|---|
security@zoom.us | https://www.zoom.com/en/trust/security-bulletin/zsb-25015 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zoom | meeting_software_development_kit | * | |
zoom | rooms | * | |
zoom | rooms_controller | * | |
zoom | workplace_desktop | * | |
zoom | workplace_virtual_desktop_infrastructure | * | |
zoom | workplace_virtual_desktop_infrastructure | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:windows:*:*", "matchCriteriaId": "B33EFD2F-1F24-402A-891E-4C11D40B150E", "versionEndExcluding": "6.3.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:windows:*:*", "matchCriteriaId": "390D202B-A60A-411E-8A57-0AF1C2BB0497", "versionEndExcluding": "6.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:windows:*:*", "matchCriteriaId": "A117F0E2-8079-41C5-B619-D9059A3120E4", "versionEndExcluding": "6.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:windows:*:*", "matchCriteriaId": "51A72376-A363-49F2-A68B-D03BD975BFF5", "versionEndExcluding": "6.3.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_virtual_desktop_infrastructure:*:*:*:*:*:windows:*:*", "matchCriteriaId": "EBFBB899-04A6-4089-9BCD-A2DE4B748916", "versionEndExcluding": "6.1.16", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_virtual_desktop_infrastructure:*:*:*:*:*:windows:*:*", "matchCriteriaId": "BD8A3DE0-D5D5-4B66-B7B2-8567EAA834BB", "versionEndExcluding": "6.2.12", "versionStartIncluding": "6.1.17", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Null pointer dereference in some Zoom Workplace Apps for Windows may allow an authenticated user to conduct a denial of service via network access." }, { "lang": "es", "value": "La desreferencia de puntero nulo en algunas aplicaciones de Zoom Workplace para Windows puede permitir que un usuario autenticado realice una denegaci\u00f3n de servicio a trav\u00e9s del acceso a la red." } ], "id": "CVE-2025-30670", "lastModified": "2025-08-01T19:07:53.050", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "security@zoom.us", "type": "Secondary" } ] }, "published": "2025-04-08T17:15:38.413", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-25015" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "security@zoom.us", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2024-08-14 17:15
Modified
2024-09-04 21:35
Severity ?
4.9 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
4.9 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
4.9 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
Summary
Sensitive information disclosure in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow a privileged user to conduct an information disclosure via network access.
References
▶ | URL | Tags | |
---|---|---|---|
security@zoom.us | https://www.zoom.com/en/trust/security-bulletin/zsb-24030 | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:android:*:*", "matchCriteriaId": "CCF91C03-5DC9-4AC5-AB5F-36708AD86A97", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "6E039542-3E10-4565-9543-71F50F06A933", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:macos:*:*", "matchCriteriaId": "8629FE9D-2BFF-44F5-8E66-2702BD92E2E5", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:windows:*:*", "matchCriteriaId": "F82C8A03-C83C-4404-84C1-D9D4836B9982", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:ipados:*:*", "matchCriteriaId": "9A8F4501-FF62-4C1B-9232-875D6B09B509", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:macos:*:*", "matchCriteriaId": "30C8F150-F275-423E-818C-B15B929FA006", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:windows:*:*", "matchCriteriaId": "242D5F39-22FC-4304-8F36-3A0A23BDCC6E", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:android:*:*", "matchCriteriaId": "603C3411-C4F4-4451-BA4B-C463EC11C707", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:linux:*:*", "matchCriteriaId": "A1D900AF-A23B-4D1C-BDE3-CE99DFFBDEBB", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:macos:*:*", "matchCriteriaId": "B497C5C3-921E-462B-91A3-58DA2F669236", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:windows:*:*", "matchCriteriaId": "D40263F3-4A0E-418E-AF91-8AD20A957D9F", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace:*:*:*:*:*:android:*:*", "matchCriteriaId": "2C19D307-3FE4-40A2-BEE6-C04B71597D50", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "8FE458E6-5ACB-428D-A339-D826E5EDDAD1", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:linux:*:*", "matchCriteriaId": "65DD163F-BB0E-4BE3-9545-F379774F3AE4", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:macos:*:*", "matchCriteriaId": "29182D36-6FB9-4340-A6B9-F6F81FE57443", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:windows:*:*", "matchCriteriaId": "3A34FEBC-6E74-4F03-BFA7-FD37226097F1", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_virtual_desktop_infrastructure:*:*:*:*:*:windows:*:*", "matchCriteriaId": "E725630A-E7C2-4C15-BFFA-50EE34D3EE68", "versionEndExcluding": "5.17.14", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_virtual_desktop_infrastructure:*:*:*:*:*:windows:*:*", "matchCriteriaId": "61AC2191-2286-4328-9E4E-2C78E1D37734", "versionEndExcluding": "6.0.11", "versionStartIncluding": "6.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sensitive information disclosure in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow a privileged user to conduct an information disclosure via network access." }, { "lang": "es", "value": " La divulgaci\u00f3n de informaci\u00f3n confidencial en algunas aplicaciones, SDK, clientes de salas y controladores de salas de Zoom Workplace puede permitir que un usuario privilegiado realice una divulgaci\u00f3n de informaci\u00f3n a trav\u00e9s del acceso a la red." } ], "id": "CVE-2024-42434", "lastModified": "2024-09-04T21:35:50.963", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 3.6, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-08-14T17:15:16.270", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24030" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "security@zoom.us", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-04-08 17:15
Modified
2025-08-01 19:11
Severity ?
Summary
Null pointer dereference in some Zoom Workplace Apps for Windows may allow an authenticated user to conduct a denial of service via network access.
References
▶ | URL | Tags | |
---|---|---|---|
security@zoom.us | https://www.zoom.com/en/trust/security-bulletin/zsb-25015 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zoom | meeting_software_development_kit | * | |
zoom | rooms | * | |
zoom | rooms_controller | * | |
zoom | workplace_desktop | * | |
zoom | workplace_virtual_desktop_infrastructure | * | |
zoom | workplace_virtual_desktop_infrastructure | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:windows:*:*", "matchCriteriaId": "B33EFD2F-1F24-402A-891E-4C11D40B150E", "versionEndExcluding": "6.3.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:windows:*:*", "matchCriteriaId": "390D202B-A60A-411E-8A57-0AF1C2BB0497", "versionEndExcluding": "6.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:windows:*:*", "matchCriteriaId": "A117F0E2-8079-41C5-B619-D9059A3120E4", "versionEndExcluding": "6.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:windows:*:*", "matchCriteriaId": "51A72376-A363-49F2-A68B-D03BD975BFF5", "versionEndExcluding": "6.3.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_virtual_desktop_infrastructure:*:*:*:*:*:windows:*:*", "matchCriteriaId": "EBFBB899-04A6-4089-9BCD-A2DE4B748916", "versionEndExcluding": "6.1.16", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_virtual_desktop_infrastructure:*:*:*:*:*:windows:*:*", "matchCriteriaId": "BD8A3DE0-D5D5-4B66-B7B2-8567EAA834BB", "versionEndExcluding": "6.2.12", "versionStartIncluding": "6.1.17", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Null pointer dereference in some Zoom Workplace Apps for Windows may allow an authenticated user to conduct a denial of service via network access." }, { "lang": "es", "value": "La desreferencia de puntero nulo en algunas aplicaciones de Zoom Workplace para Windows puede permitir que un usuario autenticado realice una denegaci\u00f3n de servicio a trav\u00e9s del acceso a la red." } ], "id": "CVE-2025-30671", "lastModified": "2025-08-01T19:11:04.940", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "security@zoom.us", "type": "Secondary" } ] }, "published": "2025-04-08T17:15:38.607", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-25015" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "security@zoom.us", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2025-02-25 20:15
Modified
2025-03-04 20:43
Severity ?
4.9 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
Incorrect ownership assignment in some Zoom Workplace Apps may allow a privileged user to conduct an information disclosure via network access.
References
▶ | URL | Tags | |
---|---|---|---|
security@zoom.us | https://www.zoom.com/en/trust/security-bulletin/zsb-24038/ | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "6E039542-3E10-4565-9543-71F50F06A933", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:linux:*:*", "matchCriteriaId": "BAB2DBC4-95E2-47D1-A343-12A09D3E9D38", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:windows:*:*", "matchCriteriaId": "F82C8A03-C83C-4404-84C1-D9D4836B9982", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:ipad_os:*:*", "matchCriteriaId": "23B5BD12-AA42-47A8-9BC7-5F59B48160C9", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:windows:*:*", "matchCriteriaId": "242D5F39-22FC-4304-8F36-3A0A23BDCC6E", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:linux:*:*", "matchCriteriaId": "A1D900AF-A23B-4D1C-BDE3-CE99DFFBDEBB", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:macos:*:*", "matchCriteriaId": "B497C5C3-921E-462B-91A3-58DA2F669236", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:windows:*:*", "matchCriteriaId": "D40263F3-4A0E-418E-AF91-8AD20A957D9F", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "8FE458E6-5ACB-428D-A339-D826E5EDDAD1", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:linux:*:*", "matchCriteriaId": "65DD163F-BB0E-4BE3-9545-F379774F3AE4", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:windows:*:*", "matchCriteriaId": "3A34FEBC-6E74-4F03-BFA7-FD37226097F1", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_virtual_desktop_infrastructure:*:*:*:*:*:windows:*:*", "matchCriteriaId": "22369469-1A7D-4130-B5AE-E76F31405B94", "versionEndExcluding": "6.1.10", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect ownership assignment in some Zoom Workplace Apps may allow a privileged user to conduct an information disclosure via network access." }, { "lang": "es", "value": "La asignaci\u00f3n de propiedad incorrecta en algunas aplicaciones de Zoom Workplace puede permitir que un usuario privilegiado realice una divulgaci\u00f3n de informaci\u00f3n a trav\u00e9s del acceso a la red." } ], "id": "CVE-2024-45426", "lastModified": "2025-03-04T20:43:35.193", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 3.6, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-02-25T20:15:35.927", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24038/" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-708" } ], "source": "security@zoom.us", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-08-14 17:15
Modified
2024-09-04 21:28
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
Sensitive information exposure in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow an authenticated user to conduct an information disclosure via network access.
References
▶ | URL | Tags | |
---|---|---|---|
security@zoom.us | https://www.zoom.com/en/trust/security-bulletin/zsb-24029 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zoom | meeting_software_development_kit | * | |
zoom | meeting_software_development_kit | * | |
zoom | rooms | * | |
zoom | rooms | * | |
zoom | rooms | * | |
zoom | rooms_controller | * | |
zoom | rooms_controller | * | |
zoom | rooms_controller | * | |
zoom | rooms_controller | * | |
zoom | workplace | * | |
zoom | workplace | * | |
zoom | workplace_desktop | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:android:*:*", "matchCriteriaId": "3317B66C-1FBB-4F9C-BC87-8AE4A18D96EE", "versionEndExcluding": "6.0.12", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "D300722C-BFDD-45B5-AA62-4ADE987B1B08", "versionEndExcluding": "6.0.12", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:ipados:*:*", "matchCriteriaId": "9A8F4501-FF62-4C1B-9232-875D6B09B509", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:macos:*:*", "matchCriteriaId": "30C8F150-F275-423E-818C-B15B929FA006", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:windows:*:*", "matchCriteriaId": "242D5F39-22FC-4304-8F36-3A0A23BDCC6E", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:android:*:*", "matchCriteriaId": "603C3411-C4F4-4451-BA4B-C463EC11C707", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:linux:*:*", "matchCriteriaId": "A1D900AF-A23B-4D1C-BDE3-CE99DFFBDEBB", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:macos:*:*", "matchCriteriaId": "B497C5C3-921E-462B-91A3-58DA2F669236", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:windows:*:*", "matchCriteriaId": "D40263F3-4A0E-418E-AF91-8AD20A957D9F", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace:*:*:*:*:*:android:*:*", "matchCriteriaId": "DDDA5ACF-B421-451F-997B-3A11CA39EAD8", "versionEndExcluding": "6.0.12", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "F607299C-CA29-49AE-98E6-E26DF095D649", "versionEndExcluding": "6.0.12", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:linux:*:*", "matchCriteriaId": "E6290901-6547-4AAF-89D2-D95A8AF8FA4F", "versionEndExcluding": "6.0.12", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sensitive information exposure in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow an authenticated user to conduct an information disclosure via network access." }, { "lang": "es", "value": " La divulgaci\u00f3n de informaci\u00f3n confidencial en algunas aplicaciones, SDK, clientes de salas y controladores de salas de Zoom Workplace puede permitir que un usuario privilegiado realice una divulgaci\u00f3n de informaci\u00f3n a trav\u00e9s del acceso a la red." } ], "id": "CVE-2024-39822", "lastModified": "2024-09-04T21:28:37.727", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-08-14T17:15:15.207", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24029" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "security@zoom.us", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-04-08 17:15
Modified
2025-08-01 19:02
Severity ?
2.8 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Summary
Insecure default variable initialization in some Zoom Workplace Apps for Windows may allow an authenticated user to conduct a loss of integrity via local access.
References
▶ | URL | Tags | |
---|---|---|---|
security@zoom.us | https://www.zoom.com/en/trust/security-bulletin/zsb-25014 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zoom | meeting_software_development_kit | * | |
zoom | rooms | * | |
zoom | rooms_controller | * | |
zoom | workplace_desktop | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:windows:*:*", "matchCriteriaId": "B33EFD2F-1F24-402A-891E-4C11D40B150E", "versionEndExcluding": "6.3.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:windows:*:*", "matchCriteriaId": "390D202B-A60A-411E-8A57-0AF1C2BB0497", "versionEndExcluding": "6.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:windows:*:*", "matchCriteriaId": "A117F0E2-8079-41C5-B619-D9059A3120E4", "versionEndExcluding": "6.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:windows:*:*", "matchCriteriaId": "51A72376-A363-49F2-A68B-D03BD975BFF5", "versionEndExcluding": "6.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insecure default variable initialization in some Zoom Workplace Apps for Windows may allow an authenticated user to conduct a loss of integrity via local access." }, { "lang": "es", "value": "La inicializaci\u00f3n insegura de variables predeterminadas en algunas aplicaciones de Zoom Workplace para Windows puede permitir que un usuario autenticado realice una p\u00e9rdida de integridad a trav\u00e9s del acceso local." } ], "id": "CVE-2025-27443", "lastModified": "2025-08-01T19:02:03.573", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.8, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.3, "impactScore": 1.4, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-04-08T17:15:38.113", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-25014" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-1188" } ], "source": "security@zoom.us", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2025-05-14 18:15
Modified
2025-08-19 19:14
Severity ?
Summary
Buffer over-read in some Zoom Workplace Apps for Windows may allow an authenticated user to conduct a denial of service via network access.
References
▶ | URL | Tags | |
---|---|---|---|
security@zoom.us | https://www.zoom.com/en/trust/security-bulletin/zsb-25021 | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:windows:*:*", "matchCriteriaId": "A3D5AD71-8BC5-4346-B8B2-1166AD0415FF", "versionEndExcluding": "6.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:windows:*:*", "matchCriteriaId": "390D202B-A60A-411E-8A57-0AF1C2BB0497", "versionEndExcluding": "6.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:windows:*:*", "matchCriteriaId": "A117F0E2-8079-41C5-B619-D9059A3120E4", "versionEndExcluding": "6.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:windows:*:*", "matchCriteriaId": "63C6EF40-B762-4FE8-83AA-D9D4600A5C92", "versionEndExcluding": "6.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_virtual_desktop_infrastructure:*:*:*:*:*:windows:*:*", "matchCriteriaId": "B4CF0315-8092-424B-9254-05FF6DDDA029", "versionEndExcluding": "6.1.17", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_virtual_desktop_infrastructure:*:*:*:*:*:windows:*:*", "matchCriteriaId": "71A0CC0D-D415-46DB-B566-DB7C41A6E277", "versionEndExcluding": "6.2.13", "versionStartIncluding": "6.1.18", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_virtual_desktop_infrastructure:*:*:*:*:*:windows:*:*", "matchCriteriaId": "D2276405-3395-4252-A140-06C9A9BDBCDB", "versionEndExcluding": "6.3.10", "versionStartIncluding": "6.2.14", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer over-read in some Zoom Workplace Apps for Windows may allow an authenticated user to conduct a denial of service via network access." }, { "lang": "es", "value": "La sobrelectura del b\u00fafer en algunas aplicaciones de Zoom Workplace para Windows puede permitir que un usuario autenticado realice una denegaci\u00f3n de servicio a trav\u00e9s del acceso a la red." } ], "id": "CVE-2025-46785", "lastModified": "2025-08-19T19:14:44.837", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "security@zoom.us", "type": "Secondary" } ] }, "published": "2025-05-14T18:15:31.080", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-25021" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-120" } ], "source": "security@zoom.us", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2025-02-25 20:15
Modified
2025-03-05 13:53
Severity ?
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Summary
Business logic error in some Zoom Workplace Apps may allow an unauthenticated user to conduct a disclosure of information via network access.
References
▶ | URL | Tags | |
---|---|---|---|
security@zoom.us | https://www.zoom.com/en/trust/security-bulletin/zsb-24036/ | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:android:*:*", "matchCriteriaId": "CCF91C03-5DC9-4AC5-AB5F-36708AD86A97", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "6E039542-3E10-4565-9543-71F50F06A933", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:linux:*:*", "matchCriteriaId": "BAB2DBC4-95E2-47D1-A343-12A09D3E9D38", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:macos:*:*", "matchCriteriaId": "8629FE9D-2BFF-44F5-8E66-2702BD92E2E5", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:windows:*:*", "matchCriteriaId": "F82C8A03-C83C-4404-84C1-D9D4836B9982", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:ipad_os:*:*", "matchCriteriaId": "23B5BD12-AA42-47A8-9BC7-5F59B48160C9", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:macos:*:*", "matchCriteriaId": "30C8F150-F275-423E-818C-B15B929FA006", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:windows:*:*", "matchCriteriaId": "242D5F39-22FC-4304-8F36-3A0A23BDCC6E", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:android:*:*", "matchCriteriaId": "603C3411-C4F4-4451-BA4B-C463EC11C707", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:linux:*:*", "matchCriteriaId": "A1D900AF-A23B-4D1C-BDE3-CE99DFFBDEBB", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:macos:*:*", "matchCriteriaId": "B497C5C3-921E-462B-91A3-58DA2F669236", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:windows:*:*", "matchCriteriaId": "D40263F3-4A0E-418E-AF91-8AD20A957D9F", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace:*:*:*:*:*:android:*:*", "matchCriteriaId": "2C19D307-3FE4-40A2-BEE6-C04B71597D50", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "8FE458E6-5ACB-428D-A339-D826E5EDDAD1", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:linux:*:*", "matchCriteriaId": "65DD163F-BB0E-4BE3-9545-F379774F3AE4", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:macos:*:*", "matchCriteriaId": "29182D36-6FB9-4340-A6B9-F6F81FE57443", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:windows:*:*", "matchCriteriaId": "3A34FEBC-6E74-4F03-BFA7-FD37226097F1", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_virtual_desktop_infrastructure:*:*:*:*:*:windows:*:*", "matchCriteriaId": "22369469-1A7D-4130-B5AE-E76F31405B94", "versionEndExcluding": "6.1.10", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Business logic error in some Zoom Workplace Apps may allow an unauthenticated user to conduct a disclosure of information via network access." }, { "lang": "es", "value": "Un error de l\u00f3gica empresarial en algunas aplicaciones de Zoom Workplace puede permitir que un usuario no autenticado realice una divulgaci\u00f3n de informaci\u00f3n a trav\u00e9s del acceso a la red." } ], "id": "CVE-2024-45424", "lastModified": "2025-03-05T13:53:53.100", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-02-25T20:15:35.570", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24036/" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-840" } ], "source": "security@zoom.us", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-08-14 17:15
Modified
2024-09-04 21:36
Severity ?
4.9 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
4.9 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
4.9 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
Summary
Sensitive information disclosure in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow a privileged user to conduct an information disclosure via network access.
References
▶ | URL | Tags | |
---|---|---|---|
security@zoom.us | https://www.zoom.com/en/trust/security-bulletin/zsb-24030 | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:android:*:*", "matchCriteriaId": "CCF91C03-5DC9-4AC5-AB5F-36708AD86A97", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "6E039542-3E10-4565-9543-71F50F06A933", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:macos:*:*", "matchCriteriaId": "8629FE9D-2BFF-44F5-8E66-2702BD92E2E5", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:windows:*:*", "matchCriteriaId": "F82C8A03-C83C-4404-84C1-D9D4836B9982", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:ipados:*:*", "matchCriteriaId": "9A8F4501-FF62-4C1B-9232-875D6B09B509", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:macos:*:*", "matchCriteriaId": "30C8F150-F275-423E-818C-B15B929FA006", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:windows:*:*", "matchCriteriaId": "242D5F39-22FC-4304-8F36-3A0A23BDCC6E", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:android:*:*", "matchCriteriaId": "603C3411-C4F4-4451-BA4B-C463EC11C707", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:linux:*:*", "matchCriteriaId": "A1D900AF-A23B-4D1C-BDE3-CE99DFFBDEBB", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:macos:*:*", "matchCriteriaId": "B497C5C3-921E-462B-91A3-58DA2F669236", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:windows:*:*", "matchCriteriaId": "D40263F3-4A0E-418E-AF91-8AD20A957D9F", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace:*:*:*:*:*:android:*:*", "matchCriteriaId": "2C19D307-3FE4-40A2-BEE6-C04B71597D50", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "8FE458E6-5ACB-428D-A339-D826E5EDDAD1", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:linux:*:*", "matchCriteriaId": "65DD163F-BB0E-4BE3-9545-F379774F3AE4", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:macos:*:*", "matchCriteriaId": "29182D36-6FB9-4340-A6B9-F6F81FE57443", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:windows:*:*", "matchCriteriaId": "3A34FEBC-6E74-4F03-BFA7-FD37226097F1", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_virtual_desktop_infrastructure:*:*:*:*:*:windows:*:*", "matchCriteriaId": "E725630A-E7C2-4C15-BFFA-50EE34D3EE68", "versionEndExcluding": "5.17.14", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_virtual_desktop_infrastructure:*:*:*:*:*:windows:*:*", "matchCriteriaId": "61AC2191-2286-4328-9E4E-2C78E1D37734", "versionEndExcluding": "6.0.11", "versionStartIncluding": "6.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sensitive information disclosure in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow a privileged user to conduct an information disclosure via network access." }, { "lang": "es", "value": " La divulgaci\u00f3n de informaci\u00f3n confidencial en algunas aplicaciones, SDK, clientes de salas y controladores de salas de Zoom Workplace puede permitir que un usuario privilegiado realice una divulgaci\u00f3n de informaci\u00f3n a trav\u00e9s del acceso a la red." } ], "id": "CVE-2024-42435", "lastModified": "2024-09-04T21:36:53.027", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 3.6, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-08-14T17:15:16.510", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24030" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "security@zoom.us", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-11-19 20:15
Modified
2025-08-19 14:22
Severity ?
8.1 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Summary
Improper input validation in some Zoom Apps may allow an unauthenticated user to conduct a disclosure of information via network access.
References
▶ | URL | Tags | |
---|---|---|---|
security@zoom.us | https://www.zoom.com/en/trust/security-bulletin/zsb-24041 | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:android:*:*", "matchCriteriaId": "FDAC7DED-7124-49DC-81FE-3A846C6FAC6B", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "8E8DDD36-808D-4864-AA07-0760E4375FCA", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:linux:*:*", "matchCriteriaId": "49957FA5-35FF-40AC-B88E-A235FA00F639", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:macos:*:*", "matchCriteriaId": "B02E0B95-F342-4D19-9C56-0ED458942E09", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:windows:*:*", "matchCriteriaId": "6398CA4B-4E28-4004-A5AA-0FBFAC5D2D13", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:ipados:*:*", "matchCriteriaId": "A3484384-C52C-41FF-91FC-5D0A2227CD83", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:macos:*:*", "matchCriteriaId": "05EFB308-185E-41CD-9E1F-A6EAB1BE3314", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:windows:*:*", "matchCriteriaId": "7AC5BD11-4FF8-4BEA-9151-75E165750703", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:android:*:*", "matchCriteriaId": "8DF64BAE-8FB5-4FB1-AA60-F34DA38B7882", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:linux:*:*", "matchCriteriaId": "7C050E43-5F66-4F82-8725-6D4F86C2D7FC", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:macos:*:*", "matchCriteriaId": "78CF87EF-1F6A-4059-AA3F-C9EFAB6311E4", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:android:*:*", "matchCriteriaId": "F7D73FAD-D117-46F1-A30F-B373103576BB", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "1615D4AC-42A1-4A37-80E8-DD312EF7D9D3", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:linux:*:*", "matchCriteriaId": "C11934B8-2EFA-4274-ADAD-53447B0BC972", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:macos:*:*", "matchCriteriaId": "70AEFFD5-918F-4046-9856-C665C2DEF4C4", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:windows:*:*", "matchCriteriaId": "F18288EB-7820-4C47-A589-BF3DA06A75C0", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace:*:*:*:*:*:android:*:*", "matchCriteriaId": "39EF83F4-626A-43F1-9312-147F65B1EC5E", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "21D7D4E9-14DF-48CF-A9F9-A61408B59789", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:linux:*:*", "matchCriteriaId": "655AC669-B03B-4BDD-B578-F6F02FAD857E", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:macos:*:*", "matchCriteriaId": "8A311271-1418-4E8C-90B5-960E37592BAE", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:windows:*:*", "matchCriteriaId": "F401A8C2-F0DF-4EC9-B0C2-11D9EB1BED15", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_virtual_desktop_infrastructure:*:*:*:*:*:windows:*:*", "matchCriteriaId": "08CE31A1-63E5-4CCD-8588-CEB3B4B68A29", "versionEndExcluding": "6.0.14", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_virtual_desktop_infrastructure:*:*:*:*:*:windows:*:*", "matchCriteriaId": "C66DCB81-D040-4E51-AB22-58271A36A5DA", "versionEndExcluding": "6.1.12", "versionStartIncluding": "6.0.15", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper input validation in some Zoom Apps may allow an unauthenticated user to conduct a disclosure of information via network access." }, { "lang": "es", "value": "La validaci\u00f3n de entrada incorrecta en algunas aplicaciones de Zoom puede permitir que un usuario no autenticado realice una divulgaci\u00f3n de informaci\u00f3n a trav\u00e9s del acceso a la red." } ], "id": "CVE-2024-45419", "lastModified": "2025-08-19T14:22:03.920", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-11-19T20:15:30.973", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24041" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-252" } ], "source": "security@zoom.us", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2024-08-14 17:15
Modified
2024-09-04 21:30
Severity ?
4.9 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
4.9 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
4.9 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
Summary
Sensitive information disclosure in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow a privileged user to conduct an information disclosure via network access.
References
▶ | URL | Tags | |
---|---|---|---|
security@zoom.us | https://www.zoom.com/en/trust/security-bulletin/zsb-24030 | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:android:*:*", "matchCriteriaId": "CCF91C03-5DC9-4AC5-AB5F-36708AD86A97", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "6E039542-3E10-4565-9543-71F50F06A933", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:macos:*:*", "matchCriteriaId": "8629FE9D-2BFF-44F5-8E66-2702BD92E2E5", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:windows:*:*", "matchCriteriaId": "F82C8A03-C83C-4404-84C1-D9D4836B9982", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:ipados:*:*", "matchCriteriaId": "9A8F4501-FF62-4C1B-9232-875D6B09B509", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:macos:*:*", "matchCriteriaId": "30C8F150-F275-423E-818C-B15B929FA006", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:windows:*:*", "matchCriteriaId": "242D5F39-22FC-4304-8F36-3A0A23BDCC6E", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:android:*:*", "matchCriteriaId": "603C3411-C4F4-4451-BA4B-C463EC11C707", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:linux:*:*", "matchCriteriaId": "A1D900AF-A23B-4D1C-BDE3-CE99DFFBDEBB", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:macos:*:*", "matchCriteriaId": "B497C5C3-921E-462B-91A3-58DA2F669236", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:windows:*:*", "matchCriteriaId": "D40263F3-4A0E-418E-AF91-8AD20A957D9F", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace:*:*:*:*:*:android:*:*", "matchCriteriaId": "2C19D307-3FE4-40A2-BEE6-C04B71597D50", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "8FE458E6-5ACB-428D-A339-D826E5EDDAD1", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:linux:*:*", "matchCriteriaId": "65DD163F-BB0E-4BE3-9545-F379774F3AE4", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:macos:*:*", "matchCriteriaId": "29182D36-6FB9-4340-A6B9-F6F81FE57443", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:windows:*:*", "matchCriteriaId": "3A34FEBC-6E74-4F03-BFA7-FD37226097F1", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_virtual_desktop_infrastructure:*:*:*:*:*:windows:*:*", "matchCriteriaId": "E725630A-E7C2-4C15-BFFA-50EE34D3EE68", "versionEndExcluding": "5.17.14", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_virtual_desktop_infrastructure:*:*:*:*:*:windows:*:*", "matchCriteriaId": "61AC2191-2286-4328-9E4E-2C78E1D37734", "versionEndExcluding": "6.0.11", "versionStartIncluding": "6.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sensitive information disclosure in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow a privileged user to conduct an information disclosure via network access." }, { "lang": "es", "value": " La divulgaci\u00f3n de informaci\u00f3n confidencial en algunas aplicaciones, SDK, clientes de salas y controladores de salas de Zoom Workplace puede permitir que un usuario privilegiado realice una divulgaci\u00f3n de informaci\u00f3n a trav\u00e9s del acceso a la red." } ], "id": "CVE-2024-39823", "lastModified": "2024-09-04T21:30:22.210", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 3.6, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-08-14T17:15:15.437", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24030" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "security@zoom.us", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-08-14 17:15
Modified
2024-09-04 21:32
Severity ?
4.9 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
4.9 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
4.9 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
Summary
Sensitive information disclosure in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow a privileged user to conduct an information disclosure via network access.
References
▶ | URL | Tags | |
---|---|---|---|
security@zoom.us | https://www.zoom.com/en/trust/security-bulletin/zsb-24030 | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:android:*:*", "matchCriteriaId": "CCF91C03-5DC9-4AC5-AB5F-36708AD86A97", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "6E039542-3E10-4565-9543-71F50F06A933", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:macos:*:*", "matchCriteriaId": "8629FE9D-2BFF-44F5-8E66-2702BD92E2E5", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:windows:*:*", "matchCriteriaId": "F82C8A03-C83C-4404-84C1-D9D4836B9982", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:ipados:*:*", "matchCriteriaId": "9A8F4501-FF62-4C1B-9232-875D6B09B509", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:macos:*:*", "matchCriteriaId": "30C8F150-F275-423E-818C-B15B929FA006", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:windows:*:*", "matchCriteriaId": "242D5F39-22FC-4304-8F36-3A0A23BDCC6E", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:android:*:*", "matchCriteriaId": "603C3411-C4F4-4451-BA4B-C463EC11C707", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:linux:*:*", "matchCriteriaId": "A1D900AF-A23B-4D1C-BDE3-CE99DFFBDEBB", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:macos:*:*", "matchCriteriaId": "B497C5C3-921E-462B-91A3-58DA2F669236", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:windows:*:*", "matchCriteriaId": "D40263F3-4A0E-418E-AF91-8AD20A957D9F", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace:*:*:*:*:*:android:*:*", "matchCriteriaId": "2C19D307-3FE4-40A2-BEE6-C04B71597D50", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "8FE458E6-5ACB-428D-A339-D826E5EDDAD1", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:linux:*:*", "matchCriteriaId": "65DD163F-BB0E-4BE3-9545-F379774F3AE4", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:macos:*:*", "matchCriteriaId": "29182D36-6FB9-4340-A6B9-F6F81FE57443", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:windows:*:*", "matchCriteriaId": "3A34FEBC-6E74-4F03-BFA7-FD37226097F1", "versionEndExcluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_virtual_desktop_infrastructure:*:*:*:*:*:windows:*:*", "matchCriteriaId": "E725630A-E7C2-4C15-BFFA-50EE34D3EE68", "versionEndExcluding": "5.17.14", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_virtual_desktop_infrastructure:*:*:*:*:*:windows:*:*", "matchCriteriaId": "61AC2191-2286-4328-9E4E-2C78E1D37734", "versionEndExcluding": "6.0.11", "versionStartIncluding": "6.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sensitive information disclosure in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow a privileged user to conduct an information disclosure via network access." }, { "lang": "es", "value": " La divulgaci\u00f3n de informaci\u00f3n confidencial en algunas aplicaciones, SDK, clientes de salas y controladores de salas de Zoom Workplace puede permitir que un usuario privilegiado realice una divulgaci\u00f3n de informaci\u00f3n a trav\u00e9s del acceso a la red." } ], "id": "CVE-2024-39824", "lastModified": "2024-09-04T21:32:02.783", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 3.6, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-08-14T17:15:15.670", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24030" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "security@zoom.us", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-05-14 18:15
Modified
2025-08-05 13:44
Severity ?
Summary
NULL pointer dereference in some Zoom Workplace Apps for Windows may allow an authenticated user to conduct a denial of service via network access.
References
▶ | URL | Tags | |
---|---|---|---|
security@zoom.us | https://www.zoom.com/en/trust/security-bulletin/zsb-25018 | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:windows:*:*", "matchCriteriaId": "A3D5AD71-8BC5-4346-B8B2-1166AD0415FF", "versionEndExcluding": "6.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:windows:*:*", "matchCriteriaId": "390D202B-A60A-411E-8A57-0AF1C2BB0497", "versionEndExcluding": "6.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:windows:*:*", "matchCriteriaId": "A117F0E2-8079-41C5-B619-D9059A3120E4", "versionEndExcluding": "6.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:windows:*:*", "matchCriteriaId": "63C6EF40-B762-4FE8-83AA-D9D4600A5C92", "versionEndExcluding": "6.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_virtual_desktop_infrastructure:*:*:*:*:*:windows:*:*", "matchCriteriaId": "B4CF0315-8092-424B-9254-05FF6DDDA029", "versionEndExcluding": "6.1.17", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_virtual_desktop_infrastructure:*:*:*:*:*:windows:*:*", "matchCriteriaId": "71A0CC0D-D415-46DB-B566-DB7C41A6E277", "versionEndExcluding": "6.2.13", "versionStartIncluding": "6.1.18", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_virtual_desktop_infrastructure:*:*:*:*:*:windows:*:*", "matchCriteriaId": "D2276405-3395-4252-A140-06C9A9BDBCDB", "versionEndExcluding": "6.3.10", "versionStartIncluding": "6.2.14", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "NULL pointer dereference in some Zoom Workplace Apps for Windows may allow an authenticated user to conduct a denial of service via network access." }, { "lang": "es", "value": "La desreferencia de puntero NULL en algunas aplicaciones de Zoom Workplace para Windows puede permitir que un usuario autenticado realice una denegaci\u00f3n de servicio a trav\u00e9s del acceso a la red." } ], "id": "CVE-2025-30665", "lastModified": "2025-08-05T13:44:21.007", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "security@zoom.us", "type": "Secondary" } ] }, "published": "2025-05-14T18:15:30.317", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-25018" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "security@zoom.us", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2024-11-19 20:15
Modified
2025-08-19 14:10
Severity ?
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
Uncontrolled resource consumption in some Zoom Apps before version 6.2.0 may allow an authenticated user to conduct a denial of service via network access.
References
▶ | URL | Tags | |
---|---|---|---|
security@zoom.us | https://www.zoom.com/en/trust/security-bulletin/zsb-24042 | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:android:*:*", "matchCriteriaId": "FDAC7DED-7124-49DC-81FE-3A846C6FAC6B", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "8E8DDD36-808D-4864-AA07-0760E4375FCA", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:linux:*:*", "matchCriteriaId": "49957FA5-35FF-40AC-B88E-A235FA00F639", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:macos:*:*", "matchCriteriaId": "B02E0B95-F342-4D19-9C56-0ED458942E09", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:windows:*:*", "matchCriteriaId": "6398CA4B-4E28-4004-A5AA-0FBFAC5D2D13", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:ipados:*:*", "matchCriteriaId": "A3484384-C52C-41FF-91FC-5D0A2227CD83", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:macos:*:*", "matchCriteriaId": "05EFB308-185E-41CD-9E1F-A6EAB1BE3314", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:windows:*:*", "matchCriteriaId": "7AC5BD11-4FF8-4BEA-9151-75E165750703", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:android:*:*", "matchCriteriaId": "8DF64BAE-8FB5-4FB1-AA60-F34DA38B7882", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:linux:*:*", "matchCriteriaId": "7C050E43-5F66-4F82-8725-6D4F86C2D7FC", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:macos:*:*", "matchCriteriaId": "78CF87EF-1F6A-4059-AA3F-C9EFAB6311E4", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:windows:*:*", "matchCriteriaId": "0E9FA665-AB32-4140-91F9-57E2EA14D837", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:android:*:*", "matchCriteriaId": "F7D73FAD-D117-46F1-A30F-B373103576BB", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "1615D4AC-42A1-4A37-80E8-DD312EF7D9D3", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:linux:*:*", "matchCriteriaId": "C11934B8-2EFA-4274-ADAD-53447B0BC972", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:macos:*:*", "matchCriteriaId": "70AEFFD5-918F-4046-9856-C665C2DEF4C4", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:windows:*:*", "matchCriteriaId": "F18288EB-7820-4C47-A589-BF3DA06A75C0", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace:*:*:*:*:*:android:*:*", "matchCriteriaId": "39EF83F4-626A-43F1-9312-147F65B1EC5E", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "21D7D4E9-14DF-48CF-A9F9-A61408B59789", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:linux:*:*", "matchCriteriaId": "655AC669-B03B-4BDD-B578-F6F02FAD857E", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:macos:*:*", "matchCriteriaId": "8A311271-1418-4E8C-90B5-960E37592BAE", "versionEndExcluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:windows:*:*", "matchCriteriaId": "F401A8C2-F0DF-4EC9-B0C2-11D9EB1BED15", "versionEndExcluding": "6.2.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Uncontrolled resource consumption in some Zoom Apps before version 6.2.0 may allow an authenticated user to conduct a denial of service via network access." }, { "lang": "es", "value": "El consumo descontrolado de recursos en algunas aplicaciones de Zoom anteriores a la versi\u00f3n 6.2.0 puede permitir que un usuario autenticado realice una denegaci\u00f3n de servicio a trav\u00e9s del acceso a la red." } ], "id": "CVE-2024-45420", "lastModified": "2025-08-19T14:10:52.250", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-11-19T20:15:31.200", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24042" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "security@zoom.us", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2025-03-11 17:16
Modified
2025-08-19 17:38
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
Insufficient verification of data authenticity in some Zoom Workplace Apps may allow an unprivileged user to conduct a denial of service via network access.
References
▶ | URL | Tags | |
---|---|---|---|
security@zoom.us | https://www.zoom.com/en/trust/security-bulletin/zsb-25008/ | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:android:*:*", "matchCriteriaId": "9191AC13-CDC6-48BF-8B62-9CA5F72A2706", "versionEndExcluding": "6.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "FE1DAB56-3382-4E45-9D61-7E276557D71E", "versionEndExcluding": "6.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:linux:*:*", "matchCriteriaId": "7378AF1D-B12A-476A-9527-4D262D80BA7D", "versionEndExcluding": "6.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:macos:*:*", "matchCriteriaId": "2488A629-30E3-4CE9-B1F3-48F5203D9102", "versionEndExcluding": "6.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:windows:*:*", "matchCriteriaId": "8136B6EB-805D-4865-BD5B-295BA9A3A543", "versionEndExcluding": "6.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:android:*:*", "matchCriteriaId": "1D7B662F-B35F-478C-AD72-893452D74889", "versionEndExcluding": "6.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:ipados:*:*", "matchCriteriaId": "BA154904-1652-44E4-9774-BB3CA24CF36A", "versionEndExcluding": "6.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:macos:*:*", "matchCriteriaId": "D38173A1-A81B-426A-B95D-0C6C8C9A8F50", "versionEndExcluding": "6.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:windows:*:*", "matchCriteriaId": "ADD42918-19C1-433F-AECB-058DD39C7F02", "versionEndExcluding": "6.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:android:*:*", "matchCriteriaId": "FCB88131-CF4E-4A53-91A7-8C1652D6DEDB", "versionEndExcluding": "6.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:linux:*:*", "matchCriteriaId": "705F16F1-689B-49EA-B8F2-050125BBF360", "versionEndExcluding": "6.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:macos:*:*", "matchCriteriaId": "0A987B22-C916-4211-A798-F114C5B6D31C", "versionEndExcluding": "6.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:windows:*:*", "matchCriteriaId": "E3E1781F-76DF-40A8-BFD6-053B17515844", "versionEndExcluding": "6.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace:*:*:*:*:*:android:*:*", "matchCriteriaId": "9E391F06-867A-4C1F-80E6-BE6CCD857D36", "versionEndExcluding": "6.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "4D7BED23-44F1-44C6-B49F-BBD05659D671", "versionEndExcluding": "6.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:linux:*:*", "matchCriteriaId": "D0860894-FA98-41A0-94B3-94FE597A5309", "versionEndExcluding": "6.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:macos:*:*", "matchCriteriaId": "4C6F7418-E694-47EA-B3B5-2A4F62D5F514", "versionEndExcluding": "6.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:windows:*:*", "matchCriteriaId": "6A14D9E5-5AC3-4C24-B43D-4208B364F747", "versionEndExcluding": "6.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_virtual_desktop_infrastructure:*:*:*:*:*:windows:*:*", "matchCriteriaId": "8465466C-CA25-4802-9C9E-BBD6C10F204E", "versionEndExcluding": "6.1.15", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:workplace_virtual_desktop_infrastructure:*:*:*:*:*:windows:*:*", "matchCriteriaId": "0E05E850-A15D-49A1-8632-ADA4B79E326B", "versionEndExcluding": "6.2.10", "versionStartIncluding": "6.1.16", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient verification of data authenticity in some Zoom Workplace Apps may allow an unprivileged user to conduct a denial of service via network access." }, { "lang": "es", "value": "La verificaci\u00f3n insuficiente de la autenticidad de los datos en algunas aplicaciones de Zoom Workplace puede permitir que un usuario sin privilegios realice una denegaci\u00f3n de servicio a trav\u00e9s del acceso a la red." } ], "id": "CVE-2025-0149", "lastModified": "2025-08-19T17:38:05.023", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 2.5, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-03-11T17:16:17.523", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-25008/" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-345" } ], "source": "security@zoom.us", "type": "Secondary" } ] }