CVE-2022-22784 – Improper XML Parsing in Zoom Client for Meetings
https://notcve.org/view.php?id=CVE-2022-22784
The Zoom Client for Meetings (for Android, iOS, Linux, MacOS, and Windows) before version 5.10.0 failed to properly parse XML stanzas in XMPP messages. This can allow a malicious user to break out of the current XMPP message context and create a new message context to have the receiving users client perform a variety of actions.This issue could be used in a more sophisticated attack to forge XMPP messages from the server. Zoom Client for Meetings (para Android, iOS, Linux, MacOS y Windows) versiones anteriores a 5.10.0, no analizaba apropiadamente las estrofas XML en los mensajes XMPP. Esto puede permitir a un usuario malicioso salir del contexto actual del mensaje XMPP y crear un nuevo contexto de mensaje para que el cliente de usuarios receptores lleve a cabo una variedad de acciones. Este problema podría ser usado en un ataque más sofisticado para falsificar mensajes XMPP desde el servidor • https://explore.zoom.us/en/trust/security/security-bulletin • CWE-91: XML Injection (aka Blind XPath Injection) •
CVE-2022-22782 – Local privilege escalation in Windows Zoom Clients
https://notcve.org/view.php?id=CVE-2022-22782
The Zoom Client for Meetings for Windows prior to version 5.9.7, Zoom Rooms for Conference Room for Windows prior to version 5.10.0, Zoom Plugins for Microsoft Outlook for Windows prior to version 5.10.3, and Zoom VDI Windows Meeting Clients prior to version 5.9.6; was susceptible to a local privilege escalation issue during the installer repair operation. A malicious actor could utilize this to potentially delete system level files or folders, causing integrity or availability issues on the user’s host machine. Zoom Client for Meetings para Windows versiones anteriores a 5.9.7, Zoom Rooms for Conference Room para Windows versiones anteriores a 5.10.0, Zoom Plugins for Microsoft Outlook para Windows versiones anteriores a 5.10.3 y Zoom VDI Windows Meeting Clients versiones anteriores a 5.9.6; eran susceptibles de un problema de escalada de privilegios local durante la operación de reparación del instalador. Un actor malicioso podría usar esto para eliminar potencialmente archivos o carpetas a nivel de sistema, causando problemas de integridad o disponibilidad en la máquina anfitriona del usuario This vulnerability allows local attackers to escalate privileges on affected installations of Zoom Client. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the installer. • https://explore.zoom.us/en/trust/security/security-bulletin •
CVE-2022-22781 – Update package downgrade in Zoom Client for Meetings for MacOS
https://notcve.org/view.php?id=CVE-2022-22781
The Zoom Client for Meetings for MacOS (Standard and for IT Admin) prior to version 5.9.6 failed to properly check the package version during the update process. This could lead to a malicious actor updating an unsuspecting user’s currently installed version to a less secure version. Zoom Client for Meetings para MacOS (estándar y para administradores de TI) versiones anteriores a 5.9.6, no comprobaba apropiadamente la versión del paquete durante el proceso de actualización. Esto podría conllevar que un actor malicioso actualizara la versión actualmente instalada de un usuario desprevenido a una versión menos segura • https://explore.zoom.us/en/trust/security/security-bulletin • CWE-354: Improper Validation of Integrity Check Value •
CVE-2022-22780 – Zoom Chat Susceptible to Zip Bombing
https://notcve.org/view.php?id=CVE-2022-22780
The Zoom Client for Meetings chat functionality was susceptible to Zip bombing attacks in the following product versions: Android before version 5.8.6, iOS before version 5.9.0, Linux before version 5.8.6, macOS before version 5.7.3, and Windows before version 5.6.3. This could lead to availability issues on the client host by exhausting system resources. La funcionalidad chat de Zoom Client for Meetings era susceptible de sufrir ataques de bombardeo de Zip en las siguientes versiones del producto: Android versiones anteriores a 5.8.6, iOS versiones anteriores a 5.9.0, Linux versiones anteriores a 5.8.6, macOS versiones anteriores a 5.7.3 y Windows versiones anteriores a 5.6.3. Esto podría conllevar a problemas de disponibilidad en el host cliente al agotar los recursos del sistema • https://explore.zoom.us/en/trust/security/security-bulletin • CWE-400: Uncontrolled Resource Consumption •
CVE-2021-34425 – Server Side Request Forgery in Zoom Client for Meetings chat
https://notcve.org/view.php?id=CVE-2021-34425
The Zoom Client for Meetings before version 5.7.3 (for Android, iOS, Linux, macOS, and Windows) contain a server side request forgery vulnerability in the chat\'s "link preview" functionality. In versions prior to 5.7.3, if a user were to enable the chat\'s "link preview" feature, a malicious actor could trick the user into potentially sending arbitrary HTTP GET requests to URLs that the actor cannot reach directly. Zoom Client for Meetings anterior a la versión 5.7.3 (para Android, iOS, Linux, macOS y Windows) contiene una vulnerabilidad de falsificación de solicitudes del lado del servidor en la funcionalidad de "vista previa de enlaces" del chat. En las versiones anteriores a la 5.7.3, si un usuario habilitaba la función de "vista previa de enlaces" del chat, un actor malicioso podía engañar al usuario para que enviara solicitudes HTTP GET arbitrarias a URLs a las que el actor no podía acceder directamente. • https://explore.zoom.us/en/trust/security/security-bulletin • CWE-918: Server-Side Request Forgery (SSRF) •