Vulnerabilites related to zoom - zoom_client_for_meetings
CVE-2021-34420 (GCVE-0-2021-34420)
Vulnerability from cvelistv5
Published
2021-11-11 22:59
Modified
2024-09-16 21:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Improper Verification of Cryptographic Signature
Summary
The Zoom Client for Meetings for Windows installer before version 5.5.4 does not properly verify the signature of files with .msi, .ps1, and .bat extensions. This could lead to a malicious actor installing malicious software on a customer’s computer.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Video Communications Inc | Zoom Client for Meetings for Windows |
Version: unspecified < 5.5.4 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:12:50.184Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://medium.com/manomano-tech/a-red-team-operation-leveraging-a-zero-day-vulnerability-in-zoom-80f57fb0822e" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Zoom Client for Meetings for Windows", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "5.5.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Laurent Delosieres of ManoMano" } ], "datePublic": "2021-11-12T00:00:00", "descriptions": [ { "lang": "en", "value": "The Zoom Client for Meetings for Windows installer before version 5.5.4 does not properly verify the signature of files with .msi, .ps1, and .bat extensions. This could lead to a malicious actor installing malicious software on a customer\u2019s computer." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Verification of Cryptographic Signature", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-02T18:20:33", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin" }, { "tags": [ "x_refsource_MISC" ], "url": "https://medium.com/manomano-tech/a-red-team-operation-leveraging-a-zero-day-vulnerability-in-zoom-80f57fb0822e" } ], "source": { "discovery": "USER" }, "title": "Zoom Windows installation executable signature bypass", "x_legacyV4Record": { "CVE_data_meta": { "AKA": "Zoom Communications Inc", "ASSIGNER": "security@zoom.us", "DATE_PUBLIC": "2021-11-12T17:00:00.000Z", "ID": "CVE-2021-34420", "STATE": "PUBLIC", "TITLE": "Zoom Windows installation executable signature bypass" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Zoom Client for Meetings for Windows", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.5.4" } ] } } ] }, "vendor_name": "Zoom Video Communications Inc" } ] } }, "credit": [ { "lang": "eng", "value": "Laurent Delosieres of ManoMano" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Zoom Client for Meetings for Windows installer before version 5.5.4 does not properly verify the signature of files with .msi, .ps1, and .bat extensions. This could lead to a malicious actor installing malicious software on a customer\u2019s computer." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Verification of Cryptographic Signature" } ] } ] }, "references": { "reference_data": [ { "name": "https://explore.zoom.us/en/trust/security/security-bulletin", "refsource": "MISC", "url": "https://explore.zoom.us/en/trust/security/security-bulletin" }, { "name": "https://medium.com/manomano-tech/a-red-team-operation-leveraging-a-zero-day-vulnerability-in-zoom-80f57fb0822e", "refsource": "MISC", "url": "https://medium.com/manomano-tech/a-red-team-operation-leveraging-a-zero-day-vulnerability-in-zoom-80f57fb0822e" } ] }, "source": { "discovery": "USER" } } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2021-34420", "datePublished": "2021-11-11T22:59:18.504250Z", "dateReserved": "2021-06-09T00:00:00", "dateUpdated": "2024-09-16T21:03:43.509Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-34419 (GCVE-0-2021-34419)
Vulnerability from cvelistv5
Published
2021-11-11 22:59
Modified
2024-09-17 04:04
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Improper Encoding or Escaping of Output
Summary
In the Zoom Client for Meetings for Ubuntu Linux before version 5.1.0, there is an HTML injection flaw when sending a remote control request to a user in the process of in-meeting screen sharing. This could allow meeting participants to be targeted for social engineering attacks.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Video Communications Inc | Zoom Client for Meetings for Ubuntu Linux |
Version: unspecified < 5.1.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:12:50.022Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Zoom Client for Meetings for Ubuntu Linux", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "5.1.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Danny de Weille and Rick Verdoes of hackdefense" } ], "datePublic": "2021-11-12T00:00:00", "descriptions": [ { "lang": "en", "value": "In the Zoom Client for Meetings for Ubuntu Linux before version 5.1.0, there is an HTML injection flaw when sending a remote control request to a user in the process of in-meeting screen sharing. This could allow meeting participants to be targeted for social engineering attacks." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Encoding or Escaping of Output", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-11T22:59:34", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin" } ], "source": { "discovery": "USER" }, "title": "HTML injection in Zoom Linux client", "x_legacyV4Record": { "CVE_data_meta": { "AKA": "Zoom Communications Inc", "ASSIGNER": "security@zoom.us", "DATE_PUBLIC": "2021-11-12T17:00:00.000Z", "ID": "CVE-2021-34419", "STATE": "PUBLIC", "TITLE": "HTML injection in Zoom Linux client" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Zoom Client for Meetings for Ubuntu Linux", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.1.0" } ] } } ] }, "vendor_name": "Zoom Video Communications Inc" } ] } }, "credit": [ { "lang": "eng", "value": "Danny de Weille and Rick Verdoes of hackdefense" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In the Zoom Client for Meetings for Ubuntu Linux before version 5.1.0, there is an HTML injection flaw when sending a remote control request to a user in the process of in-meeting screen sharing. This could allow meeting participants to be targeted for social engineering attacks." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Encoding or Escaping of Output" } ] } ] }, "references": { "reference_data": [ { "name": "https://explore.zoom.us/en/trust/security/security-bulletin", "refsource": "MISC", "url": "https://explore.zoom.us/en/trust/security/security-bulletin" } ] }, "source": { "discovery": "USER" } } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2021-34419", "datePublished": "2021-11-11T22:59:34.701669Z", "dateReserved": "2021-06-09T00:00:00", "dateUpdated": "2024-09-17T04:04:27.063Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2021-11-11 23:15
Modified
2024-11-21 06:10
Severity ?
3.7 (Low) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Summary
In the Zoom Client for Meetings for Ubuntu Linux before version 5.1.0, there is an HTML injection flaw when sending a remote control request to a user in the process of in-meeting screen sharing. This could allow meeting participants to be targeted for social engineering attacks.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zoom | zoom_client_for_meetings | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:zoom_client_for_meetings:*:*:*:*:*:linux:*:*", "matchCriteriaId": "49B39D3B-962F-4E42-92C4-27A77CECA808", "versionEndExcluding": "5.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Zoom Client for Meetings for Ubuntu Linux before version 5.1.0, there is an HTML injection flaw when sending a remote control request to a user in the process of in-meeting screen sharing. This could allow meeting participants to be targeted for social engineering attacks." }, { "lang": "es", "value": "En Zoom Client for Meetings para Ubuntu Linux versiones anteriores a 5.1.0, se presenta un fallo de inyecci\u00f3n de HTML cuando es enviada una petici\u00f3n de control remoto a un usuario en el proceso de compartir la pantalla en una reuni\u00f3n. Esto podr\u00eda permitir que participantes en la reuni\u00f3n sean objeto de ataques de ingenier\u00eda social" } ], "id": "CVE-2021-34419", "lastModified": "2024-11-21T06:10:21.857", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 1.4, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-11-11T23:15:09.667", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-74" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-11-11 23:15
Modified
2024-11-21 06:10
Severity ?
4.7 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
7.4 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N
7.4 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N
Summary
The Zoom Client for Meetings for Windows installer before version 5.5.4 does not properly verify the signature of files with .msi, .ps1, and .bat extensions. This could lead to a malicious actor installing malicious software on a customer’s computer.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zoom | zoom_client_for_meetings | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:zoom_client_for_meetings:*:*:*:*:*:windows:*:*", "matchCriteriaId": "CB0A66B6-7584-4017-87B5-D1937E16C7CB", "versionEndExcluding": "5.4.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Zoom Client for Meetings for Windows installer before version 5.5.4 does not properly verify the signature of files with .msi, .ps1, and .bat extensions. This could lead to a malicious actor installing malicious software on a customer\u2019s computer." }, { "lang": "es", "value": "El instalador de Zoom Client for Meetings para Windows anterior a la versi\u00f3n 5.5.4 no verifica correctamente la firma de los archivos con extensiones .msi, .ps1 y .bat. Esto podr\u00eda dar lugar a que un actor malintencionado instalara software malicioso en el ordenador de un cliente" } ], "id": "CVE-2021-34420", "lastModified": "2024-11-21T06:10:21.993", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-11-11T23:15:09.827", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin" }, { "source": "security@zoom.us", "tags": [ "Third Party Advisory" ], "url": "https://medium.com/manomano-tech/a-red-team-operation-leveraging-a-zero-day-vulnerability-in-zoom-80f57fb0822e" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://medium.com/manomano-tech/a-red-team-operation-leveraging-a-zero-day-vulnerability-in-zoom-80f57fb0822e" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-347" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }