CVE-2023-22881 – Denial of Service in Zoom Clients
https://notcve.org/view.php?id=CVE-2023-22881
Zoom clients before version 5.13.5 contain a STUN parsing vulnerability. A malicious actor could send specially crafted UDP traffic to a victim Zoom client to remotely cause the client to crash, causing a denial of service. • https://explore.zoom.us/en/trust/security/security-bulletin • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2023-22882 – Denial of Service in Zoom Clients
https://notcve.org/view.php?id=CVE-2023-22882
Zoom clients before version 5.13.5 contain a STUN parsing vulnerability. A malicious actor could send specially crafted UDP traffic to a victim Zoom client to remotely cause the client to crash, causing a denial of service. • https://explore.zoom.us/en/trust/security/security-bulletin • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2023-22880 – Information Disclosure in Zoom for Windows Clients
https://notcve.org/view.php?id=CVE-2023-22880
Zoom for Windows clients before version 5.13.3, Zoom Rooms for Windows clients before version 5.13.5 and Zoom VDI for Windows clients before 5.13.1 contain an information disclosure vulnerability. A recent update to the Microsoft Edge WebView2 runtime used by the affected Zoom clients, transmitted text to Microsoft’s online Spellcheck service instead of the local Windows Spellcheck. Updating Zoom remediates this vulnerability by disabling the feature. Updating Microsoft Edge WebView2 Runtime to at least version 109.0.1481.0 and restarting Zoom remediates this vulnerability by updating Microsoft’s telemetry behavior. • https://explore.zoom.us/en/trust/security/security-bulletin • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2022-36928 – Path Traversal in Zoom for Android Clients
https://notcve.org/view.php?id=CVE-2022-36928
Zoom for Android clients before version 5.13.0 contain a path traversal vulnerability. A third party app could exploit this vulnerability to read and write to the Zoom application data directory. Los clientes de Zoom para Android anteriores a la versión 5.13.0 contienen una vulnerabilidad de path traversal. Una aplicación de terceros podría aprovechar esta vulnerabilidad para leer y escribir en el directorio de datos de la aplicación Zoom. • https://explore.zoom.us/en/trust/security/security-bulletin • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE-35: Path Traversal: '.../ •
CVE-2022-28755 – Improper URL parsing in Zoom Clients
https://notcve.org/view.php?id=CVE-2022-28755
The Zoom Client for Meetings (for Android, iOS, Linux, macOS, and Windows) before version 5.11.0 are susceptible to a URL parsing vulnerability. If a malicious Zoom meeting URL is opened, the malicious link may direct the user to connect to an arbitrary network address, leading to additional attacks including the potential for remote code execution through launching executables from arbitrary paths. Zoom Client for Meetings (para Android, iOS, Linux, macOS y Windows) versiones anteriores a 5.11.0, es susceptible de una vulnerabilidad de análisis de URL. Si es abierta una URL de reunión de Zoom maliciosa, el enlace malicioso puede dirigir al usuario a conectarse a una dirección de red arbitraria, lo que conlleva ataques adicionales, incluyendo la posibilidad de ejecución de código remoto mediante el lanzamiento de ejecutables desde rutas arbitrarias • https://explore.zoom.us/en/trust/security/security-bulletin • CWE-20: Improper Input Validation CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •