Action not permitted
Modal body text goes here.
Modal Title
Modal Body
wid-sec-w-2024-1820
Vulnerability from csaf_certbund
Published
2024-08-12 22:00
Modified
2024-08-12 22:00
Summary
Zoom Video Communications Rooms: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Zoom Rooms ist ein softwarebasiertes Raumsystem, das integrierte Audiokonferenzen, drahtlose Bildschirmfreigabe und Videokonferenzen ermöglicht.
Angriff
Ein Angreifer kann mehrere Schwachstellen in Zoom Video Communications Rooms ausnutzen, um Informationen offenzulegen, seine Rechte zu erweitern oder einen Denial-of-Service-Zustand auszulösen.
Betroffene Betriebssysteme
- Linux
- MacOS X
- Windows
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Zoom Rooms ist ein softwarebasiertes Raumsystem, das integrierte Audiokonferenzen, drahtlose Bildschirmfreigabe und Videokonferenzen erm\u00f6glicht.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Zoom Video Communications Rooms ausnutzen, um Informationen offenzulegen, seine Rechte zu erweitern oder einen Denial-of-Service-Zustand auszul\u00f6sen.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- MacOS X\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-1820 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1820.json" }, { "category": "self", "summary": "WID-SEC-2024-1820 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1820" }, { "category": "external", "summary": "Zoom Security Bulletin vom 2024-08-12", "url": "https://www.zoom.com/en/trust/security-bulletin/ZSB-24022/" }, { "category": "external", "summary": "Zoom Security Bulletin vom 2024-08-12", "url": "https://www.zoom.com/en/trust/security-bulletin/ZSB-24029/" }, { "category": "external", "summary": "Zoom Security Bulletin vom 2024-08-12", "url": "https://www.zoom.com/en/trust/security-bulletin/ZSB-24030/" }, { "category": "external", "summary": "Zoom Security Bulletin vom 2024-08-12", "url": "https://www.zoom.com/en/trust/security-bulletin/ZSB-24031/" }, { "category": "external", "summary": "Zoom Security Bulletin vom 2024-08-12", "url": "https://www.zoom.com/en/trust/security-bulletin/ZSB-24034/" } ], "source_lang": "en-US", "title": "Zoom Video Communications Rooms: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-08-12T22:00:00.000+00:00", "generator": { "date": "2024-08-15T18:12:11.719+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2024-1820", "initial_release_date": "2024-08-12T22:00:00.000+00:00", "revision_history": [ { "date": "2024-08-12T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c6.0.0", "product": { "name": "Zoom Video Communications Rooms \u003c6.0.0", "product_id": "T036763" } }, { "category": "product_version_range", "name": "\u003c6.1.0", "product": { "name": "Zoom Video Communications Rooms \u003c6.1.0", "product_id": "T036764" } }, { "category": "product_version_range", "name": "Controller \u003c6.1.0", "product": { "name": "Zoom Video Communications Rooms Controller \u003c6.1.0", "product_id": "T036765" } }, { "category": "product_version_range", "name": "\u003c6.1.5", "product": { "name": "Zoom Video Communications Rooms \u003c6.1.5", "product_id": "T036766" } } ], "category": "product_name", "name": "Rooms" } ], "category": "vendor", "name": "Zoom Video Communications" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-39822", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in Zoom Video Communications Rooms, die noch nicht im Detail ver\u00f6ffentlicht wurde. Ein entfernter authentifizierter Angreifer kann diese Schwachstelle ausnutzen, um vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T036763" ] }, "release_date": "2024-08-12T22:00:00.000+00:00", "title": "CVE-2024-39822" }, { "cve": "CVE-2024-39823", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Zoom Video Communications Rooms, die noch nicht im Detail ver\u00f6ffentlicht wurden. Ein entfernter authentifizierter Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T036763" ] }, "release_date": "2024-08-12T22:00:00.000+00:00", "title": "CVE-2024-39823" }, { "cve": "CVE-2024-39824", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Zoom Video Communications Rooms, die noch nicht im Detail ver\u00f6ffentlicht wurden. Ein entfernter authentifizierter Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T036763" ] }, "release_date": "2024-08-12T22:00:00.000+00:00", "title": "CVE-2024-39824" }, { "cve": "CVE-2024-42434", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Zoom Video Communications Rooms, die noch nicht im Detail ver\u00f6ffentlicht wurden. Ein entfernter authentifizierter Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T036763" ] }, "release_date": "2024-08-12T22:00:00.000+00:00", "title": "CVE-2024-42434" }, { "cve": "CVE-2024-42435", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Zoom Video Communications Rooms, die noch nicht im Detail ver\u00f6ffentlicht wurden. Ein entfernter authentifizierter Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T036763" ] }, "release_date": "2024-08-12T22:00:00.000+00:00", "title": "CVE-2024-42435" }, { "cve": "CVE-2024-39825", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in Zoom Video Communications Rooms. Dieser Fehler besteht aufgrund eines Puffer\u00fcberlaufs. Ein entfernter authentifizierter Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern." } ], "release_date": "2024-08-12T22:00:00.000+00:00", "title": "CVE-2024-39825" }, { "cve": "CVE-2024-42436", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Zoom Video Communications Rooms. Diese Fehler bestehen aufgrund eines Puffer\u00fcberlaufs. Ein entfernter authentifizierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen." } ], "product_status": { "known_affected": [ "T036763" ] }, "release_date": "2024-08-12T22:00:00.000+00:00", "title": "CVE-2024-42436" }, { "cve": "CVE-2024-42437", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Zoom Video Communications Rooms. Diese Fehler bestehen aufgrund eines Puffer\u00fcberlaufs. Ein entfernter authentifizierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen." } ], "product_status": { "known_affected": [ "T036763" ] }, "release_date": "2024-08-12T22:00:00.000+00:00", "title": "CVE-2024-42437" }, { "cve": "CVE-2024-42438", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Zoom Video Communications Rooms. Diese Fehler bestehen aufgrund eines Puffer\u00fcberlaufs. Ein entfernter authentifizierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen." } ], "product_status": { "known_affected": [ "T036763" ] }, "release_date": "2024-08-12T22:00:00.000+00:00", "title": "CVE-2024-42438" }, { "cve": "CVE-2024-42441", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Zoom Video Communications Rooms. Diese Fehler sind auf eine unsachgem\u00e4\u00dfe Verwaltung von Berechtigungen zur\u00fcckzuf\u00fchren. Ein Angreifer mit physischem Zugang kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T036763", "T036764" ] }, "release_date": "2024-08-12T22:00:00.000+00:00", "title": "CVE-2024-42441" }, { "cve": "CVE-2024-42442", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Zoom Video Communications Rooms. Diese Fehler sind auf eine unsachgem\u00e4\u00dfe Verwaltung von Berechtigungen zur\u00fcckzuf\u00fchren. Ein Angreifer mit physischem Zugang kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T036763", "T036764" ] }, "release_date": "2024-08-12T22:00:00.000+00:00", "title": "CVE-2024-42442" } ] }
CVE-2024-42442 (GCVE-0-2024-42442)
Vulnerability from cvelistv5
Published
2024-11-12 15:00
Modified
2024-11-12 15:58
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-119 - Improper Restriction of Operations within the Bounds of a Memory Buffer
Summary
APTIOV contains a vulnerability in the BIOS where a user or attacker may cause an improper restriction of operations within the bounds of a memory buffer over the network. A successful exploitation of this vulnerability may lead to code execution outside of the intended System Management Mode.
References
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:ami:aptio_v:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "aptio_v", "vendor": "ami", "versions": [ { "lessThanOrEqual": "BKS_5.37", "status": "affected", "version": "BKS_5.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-42442", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-12T15:57:57.815614Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-12T15:58:50.679Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "AptioV", "vendor": "AMI", "versions": [ { "lessThanOrEqual": "BKS_5.37", "status": "affected", "version": "BKS_5.0", "versionType": "Custom" } ] } ], "datePublic": "2024-11-12T15:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "APTIOV contains a vulnerability in the BIOS where a user or attacker may cause an improper restriction of operations within the bounds of a memory buffer over the network. A successful exploitation of this vulnerability may lead to code execution outside of the intended System Management Mode." } ], "value": "APTIOV contains a vulnerability in the BIOS where a user or attacker may cause an improper restriction of operations within the bounds of a memory buffer over the network. A successful exploitation of this vulnerability may lead to code execution outside of the intended System Management Mode." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-12T15:00:34.738Z", "orgId": "7e9044f1-7f56-4c38-8864-c0c7302263d6", "shortName": "AMI" }, "references": [ { "url": "https://9443417.fs1.hubspotusercontent-na1.net/hubfs/9443417/Security%20Advisories/2024/AMI-SA-2024004.pdf" } ], "source": { "discovery": "UNKNOWN" }, "title": "Runtime Service Access outside SMRAM", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "7e9044f1-7f56-4c38-8864-c0c7302263d6", "assignerShortName": "AMI", "cveId": "CVE-2024-42442", "datePublished": "2024-11-12T15:00:34.738Z", "dateReserved": "2024-08-01T21:19:52.794Z", "dateUpdated": "2024-11-12T15:58:50.679Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-42438 (GCVE-0-2024-42438)
Vulnerability from cvelistv5
Published
2024-08-14 16:41
Modified
2024-08-16 20:05
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-122 - Heap-based Buffer Overflow
Summary
Buffer overflow in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow an authenticated user to conduct a denial of service via network access.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Communications Inc. | Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers |
Version: see references |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-42438", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-16T20:04:49.519001Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-16T20:05:07.811Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows", "MacOS", "Linux", "iOS", "Android" ], "product": "Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers", "vendor": "Zoom Communications Inc.", "versions": [ { "status": "affected", "version": "see references" } ] } ], "datePublic": "2024-08-13T12:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Buffer overflow in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow an authenticated user to conduct a denial of service via network access." } ], "value": "Buffer overflow in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow an authenticated user to conduct a denial of service via network access." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122 Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-14T16:41:18.732Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24031" } ], "source": { "discovery": "UNKNOWN" }, "title": "Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers - Buffer Overflow", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2024-42438", "datePublished": "2024-08-14T16:41:18.732Z", "dateReserved": "2024-08-01T19:13:16.137Z", "dateUpdated": "2024-08-16T20:05:07.811Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-42437 (GCVE-0-2024-42437)
Vulnerability from cvelistv5
Published
2024-08-14 16:41
Modified
2024-08-14 17:44
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-122 - Heap-based Buffer Overflow
Summary
Buffer overflow in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow an authenticated user to conduct a denial of service via network access.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Communications Inc. | Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers |
Version: see references |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-42437", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-14T17:34:09.873943Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-14T17:44:29.139Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows", "MacOS", "Linux", "iOS", "Android" ], "product": "Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers", "vendor": "Zoom Communications Inc.", "versions": [ { "status": "affected", "version": "see references" } ] } ], "datePublic": "2024-08-13T12:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Buffer overflow in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow an authenticated user to conduct a denial of service via network access." } ], "value": "Buffer overflow in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow an authenticated user to conduct a denial of service via network access." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122 Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-14T16:41:12.866Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24031" } ], "source": { "discovery": "UNKNOWN" }, "title": "Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers - Buffer Overflow", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2024-42437", "datePublished": "2024-08-14T16:41:12.866Z", "dateReserved": "2024-08-01T19:13:16.137Z", "dateUpdated": "2024-08-14T17:44:29.139Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-39823 (GCVE-0-2024-39823)
Vulnerability from cvelistv5
Published
2024-08-14 16:39
Modified
2024-08-14 17:24
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Summary
Sensitive information disclosure in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow a privileged user to conduct an information disclosure via network access.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Communications Inc. | Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers |
Version: see references |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-39823", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-14T17:24:09.496617Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-14T17:24:16.206Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows", "MacOS", "Linux", "iOS", "Android" ], "product": "Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers", "vendor": "Zoom Communications Inc.", "versions": [ { "status": "affected", "version": "see references" } ] } ], "datePublic": "2024-08-13T12:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Sensitive information disclosure in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow a privileged user to conduct an information disclosure via network access." } ], "value": "Sensitive information disclosure in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow a privileged user to conduct an information disclosure via network access." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-14T16:39:13.132Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24030" } ], "source": { "discovery": "UNKNOWN" }, "title": "Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers - Sensitive Information Exposure", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2024-39823", "datePublished": "2024-08-14T16:39:13.132Z", "dateReserved": "2024-06-28T19:43:03.519Z", "dateUpdated": "2024-08-14T17:24:16.206Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-42441 (GCVE-0-2024-42441)
Vulnerability from cvelistv5
Published
2024-08-14 16:46
Modified
2024-08-16 13:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-269 - Improper Privilege Management
Summary
Improper privilege management in the installer for Zoom Workplace Desktop App for macOS, Zoom Meeting SDK for macOS and Zoom Rooms Client for macOS before 6.1.5 may allow a privileged user to conduct an escalation of privilege via local access.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Communications Inc. | Zoom Workplace Desktop App for macOS, Zoom Meeting SDK for macOS, Zoom Rooms Client for macOS |
Version: before version 6.1.5 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:macos:*:*" ], "defaultStatus": "unknown", "product": "workplace_desktop", "vendor": "zoom", "versions": [ { "lessThan": "6.1.5", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:zoom:macos_meeting_sdk:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "macos_meeting_sdk", "vendor": "zoom", "versions": [ { "lessThan": "6.1.5", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:zoom:rooms:-:*:*:*:*:macos:*:*" ], "defaultStatus": "unknown", "product": "rooms", "vendor": "zoom", "versions": [ { "lessThan": "6.1.5", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-42441", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-08-15T13:31:24.474262Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-16T13:17:55.333Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "MacOS" ], "product": "Zoom Workplace Desktop App for macOS, Zoom Meeting SDK for macOS, Zoom Rooms Client for macOS", "vendor": "Zoom Communications Inc.", "versions": [ { "status": "affected", "version": "before version 6.1.5" } ] } ], "datePublic": "2024-08-13T12:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper privilege management in the installer for Zoom Workplace Desktop App for macOS, Zoom Meeting SDK for macOS and Zoom Rooms Client for macOS before 6.1.5 may allow a privileged user to conduct an escalation of privilege via local access." } ], "value": "Improper privilege management in the installer for Zoom Workplace Desktop App for macOS, Zoom Meeting SDK for macOS and Zoom Rooms Client for macOS before 6.1.5 may allow a privileged user to conduct an escalation of privilege via local access." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-14T16:46:17.936Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24034" } ], "source": { "discovery": "UNKNOWN" }, "title": "Zoom Workplace Desktop App for macOS, Zoom Meeting SDK for macOS, Zoom Rooms Client for macOS - Improper Privilege Management", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2024-42441", "datePublished": "2024-08-14T16:46:17.936Z", "dateReserved": "2024-08-01T19:13:16.137Z", "dateUpdated": "2024-08-16T13:17:55.333Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-42435 (GCVE-0-2024-42435)
Vulnerability from cvelistv5
Published
2024-08-14 16:39
Modified
2024-08-15 13:58
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Summary
Sensitive information disclosure in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow a privileged user to conduct an information disclosure via network access.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Communications Inc. | Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers |
Version: see references |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-42435", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-15T13:57:52.940338Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-15T13:58:02.205Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows", "MacOS", "Linux", "iOS", "Android" ], "product": "Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers", "vendor": "Zoom Communications Inc.", "versions": [ { "status": "affected", "version": "see references" } ] } ], "datePublic": "2024-08-13T12:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Sensitive information disclosure in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow a privileged user to conduct an information disclosure via network access." } ], "value": "Sensitive information disclosure in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow a privileged user to conduct an information disclosure via network access." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-14T16:39:46.183Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24030" } ], "source": { "discovery": "UNKNOWN" }, "title": "Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers - Sensitive Information Exposure", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2024-42435", "datePublished": "2024-08-14T16:39:46.183Z", "dateReserved": "2024-08-01T19:13:16.137Z", "dateUpdated": "2024-08-15T13:58:02.205Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-39822 (GCVE-0-2024-39822)
Vulnerability from cvelistv5
Published
2024-08-14 16:38
Modified
2024-08-16 19:18
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Summary
Sensitive information exposure in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow an authenticated user to conduct an information disclosure via network access.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Communications Inc. | Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers |
Version: see references |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-39822", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-16T19:18:36.184406Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-16T19:18:44.815Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows", "MacOS", "Linux", "iOS", "Android" ], "product": "Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers", "vendor": "Zoom Communications Inc.", "versions": [ { "status": "affected", "version": "see references" } ] } ], "datePublic": "2024-08-13T12:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Sensitive information exposure in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow an authenticated user to conduct an information disclosure via network access." } ], "value": "Sensitive information exposure in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow an authenticated user to conduct an information disclosure via network access." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-14T16:38:03.416Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24029" } ], "source": { "discovery": "UNKNOWN" }, "title": "Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers - Sensitive Information Exposure", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2024-39822", "datePublished": "2024-08-14T16:38:03.416Z", "dateReserved": "2024-06-28T19:43:03.519Z", "dateUpdated": "2024-08-16T19:18:44.815Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-42434 (GCVE-0-2024-42434)
Vulnerability from cvelistv5
Published
2024-08-14 16:39
Modified
2024-08-15 13:36
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Summary
Sensitive information disclosure in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow a privileged user to conduct an information disclosure via network access.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Communications Inc. | Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers |
Version: see references |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-42434", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-15T13:36:35.542410Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-15T13:36:48.396Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows", "MacOS", "Linux", "iOS", "Android" ], "product": "Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers", "vendor": "Zoom Communications Inc.", "versions": [ { "status": "affected", "version": "see references" } ] } ], "datePublic": "2024-08-13T12:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Sensitive information disclosure in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow a privileged user to conduct an information disclosure via network access." } ], "value": "Sensitive information disclosure in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow a privileged user to conduct an information disclosure via network access." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-14T16:39:38.167Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24030" } ], "source": { "discovery": "UNKNOWN" }, "title": "Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers - Sensitive Information Exposure", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2024-42434", "datePublished": "2024-08-14T16:39:38.167Z", "dateReserved": "2024-08-01T19:13:16.137Z", "dateUpdated": "2024-08-15T13:36:48.396Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-39825 (GCVE-0-2024-39825)
Vulnerability from cvelistv5
Published
2024-08-14 16:34
Modified
2024-08-16 13:28
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-122 - Heap-based Buffer Overflow
Summary
Buffer overflow in some Zoom Workplace Apps and Rooms Clients may allow an authenticated user to conduct an escalation of privilege via network access.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Communications Inc. | Zoom Workplace Apps and Rooms Clients |
Version: see references |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:zoom:rooms:-:*:*:*:*:macos:*:*", "cpe:2.3:a:zoom:rooms:-:*:*:*:*:ipad_os:*:*", "cpe:2.3:a:zoom:rooms:*:*:*:*:*:windows:*:*" ], "defaultStatus": "unknown", "product": "rooms", "vendor": "zoom", "versions": [ { "lessThan": "6.0.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:zoom:workplace_app:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "workplace_app", "vendor": "zoom", "versions": [ { "lessThan": "6.0.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:zoom:vdi_windows_meeting_client:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "vdi_windows_meeting_client", "vendor": "zoom", "versions": [ { "lessThan": "5.17.13", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:linux:*:*", "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:windows:*:*", "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:macos:*:*" ], "defaultStatus": "unknown", "product": "workplace_desktop", "vendor": "zoom", "versions": [ { "lessThan": "6.0.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:zoom:rooms:-:*:*:*:*:macos:*:*", "cpe:2.3:a:zoom:rooms:-:*:*:*:*:ipad_os:*:*", "cpe:2.3:a:zoom:rooms:*:*:*:*:*:windows:*:*" ], "defaultStatus": "unknown", "product": "rooms", "vendor": "zoom", "versions": [ { "lessThan": "6.0.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:zoom:workplace_app:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "workplace_app", "vendor": "zoom", "versions": [ { "lessThan": "6.0.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:zoom:vdi_windows_meeting_client:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "vdi_windows_meeting_client", "vendor": "zoom", "versions": [ { "lessThan": "5.17.13", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:linux:*:*", "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:windows:*:*", "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:macos:*:*" ], "defaultStatus": "unknown", "product": "workplace_desktop", "vendor": "zoom", "versions": [ { "lessThan": "6.0.0", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-39825", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-08-16T04:01:49.345375Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-16T13:28:41.388Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows", "MacOS", "Linux", "iOS", "Android" ], "product": "Zoom Workplace Apps and Rooms Clients", "vendor": "Zoom Communications Inc.", "versions": [ { "status": "affected", "version": "see references" } ] } ], "datePublic": "2024-08-13T12:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Buffer overflow in some Zoom Workplace Apps and Rooms Clients may allow an authenticated user to conduct an escalation of privilege via network access." } ], "value": "Buffer overflow in some Zoom Workplace Apps and Rooms Clients may allow an authenticated user to conduct an escalation of privilege via network access." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122 Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-14T16:34:53.595Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24022" } ], "source": { "discovery": "UNKNOWN" }, "title": "Zoom Workplace Apps and Rooms Clients - Buffer Overflow", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2024-39825", "datePublished": "2024-08-14T16:34:53.595Z", "dateReserved": "2024-06-28T19:43:03.520Z", "dateUpdated": "2024-08-16T13:28:41.388Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-42436 (GCVE-0-2024-42436)
Vulnerability from cvelistv5
Published
2024-08-14 16:41
Modified
2024-08-14 18:25
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-122 - Heap-based Buffer Overflow
Summary
Buffer overflow in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow an authenticated user to conduct a denial of service via network access.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Communications Inc. | Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers |
Version: see references |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-42436", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-14T18:25:38.974048Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-14T18:25:52.686Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows", "MacOS", "Linux", "iOS", "Android" ], "product": "Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers", "vendor": "Zoom Communications Inc.", "versions": [ { "status": "affected", "version": "see references" } ] } ], "datePublic": "2024-08-13T12:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Buffer overflow in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow an authenticated user to conduct a denial of service via network access." } ], "value": "Buffer overflow in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow an authenticated user to conduct a denial of service via network access." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122 Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-14T16:41:03.844Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24031" } ], "source": { "discovery": "UNKNOWN" }, "title": "Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers - Buffer Overflow", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2024-42436", "datePublished": "2024-08-14T16:41:03.844Z", "dateReserved": "2024-08-01T19:13:16.137Z", "dateUpdated": "2024-08-14T18:25:52.686Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-39824 (GCVE-0-2024-39824)
Vulnerability from cvelistv5
Published
2024-08-14 16:39
Modified
2024-08-14 18:07
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Summary
Sensitive information disclosure in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow a privileged user to conduct an information disclosure via network access.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Communications Inc. | Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers |
Version: see references |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-39824", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-14T18:07:03.024733Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-14T18:07:26.505Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows", "MacOS", "Linux", "iOS", "Android" ], "product": "Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers", "vendor": "Zoom Communications Inc.", "versions": [ { "status": "affected", "version": "see references" } ] } ], "datePublic": "2024-08-13T12:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Sensitive information disclosure in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow a privileged user to conduct an information disclosure via network access." } ], "value": "Sensitive information disclosure in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow a privileged user to conduct an information disclosure via network access." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-14T16:39:26.880Z", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24030" } ], "source": { "discovery": "UNKNOWN" }, "title": "Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers - Sensitive Information Exposure", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2024-39824", "datePublished": "2024-08-14T16:39:26.880Z", "dateReserved": "2024-06-28T19:43:03.519Z", "dateUpdated": "2024-08-14T18:07:26.505Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…