Information disclosure in Zoom Client



Published: 2022-11-11
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2022-28764
CWE-ID CWE-200
Exploitation vector Local
Public exploit N/A
Vulnerable software
Subscribe
Zoom Client for Windows
Client/Desktop applications / Office applications

Zoom Client for Linux
Client/Desktop applications / Office applications

Zoom Client for macOS
Client/Desktop applications / Office applications

Zoom Client for iOS
Mobile applications / Apps for mobile phones

Zoom Client for Android
Mobile applications / Apps for mobile phones

Vendor Zoom Video Communications, Inc.

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Information disclosure

EUVDB-ID: #VU69235

Risk: Low

CVSSv3.1: 2.9 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-28764

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to the application does not clear data from the local SQL database after a meeting ends and also uses an insufficiently secure per-device key to encrypt meetings data. A local user can obtain meeting information such as in-meeting chat for the previous meeting attended from that local user account.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Zoom Client for Windows: 5.0.0 23168.0427 - 5.12.3 9638

Zoom Client for iOS: 5.0.0 23161.0427 - 5.12.2 4920

Zoom Client for Linux: 5.1.418436.0628 - 5.12.2 4816

Zoom Client for macOS: 5.0.0 23186.0427 - 5.12.3 11845

Zoom Client for Android: 5.0.1 23478.0429 - 5.12.2 9059

External links

http://explore.zoom.us/en/trust/security/security-bulletin/#ZSB-22025


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website or open a file.

The attacker would have to login to the system and perform certain actions in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###