#VU105762 Resource exhaustion in Zoom Video Communications, Inc. products - CVE-2024-45420
Published: March 17, 2025
Vulnerability identifier: #VU105762
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2024-45420
CWE-ID: CWE-400
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vulnerable software:
Zoom Workplace Desktop App for Windows
Zoom Workplace Desktop App for macOS
Zoom Workplace Desktop App for Linux
Zoom Rooms Client for Windows
Zoom Rooms Client for macOS
Zoom Rooms Controller for Windows
Zoom Rooms Controller for macOS
Zoom Rooms Controller for Linux
Zoom Workplace App for iOS
Zoom Workplace App for Android
Zoom Rooms Client for iPad
Zoom Rooms Controller for Android
Zoom Video SDK for Windows
Zoom Video SDK for macOS
Zoom Video SDK for iOS
Zoom Video SDK for Android
Zoom Video SDK for Linux
Zoom Meeting SDK for Windows
Zoom Meeting SDK for macOS
Zoom Meeting SDK for iOS
Zoom Meeting SDK for Android
Zoom Meeting SDK for Linux
Zoom Workplace Desktop App for Windows
Zoom Workplace Desktop App for macOS
Zoom Workplace Desktop App for Linux
Zoom Rooms Client for Windows
Zoom Rooms Client for macOS
Zoom Rooms Controller for Windows
Zoom Rooms Controller for macOS
Zoom Rooms Controller for Linux
Zoom Workplace App for iOS
Zoom Workplace App for Android
Zoom Rooms Client for iPad
Zoom Rooms Controller for Android
Zoom Video SDK for Windows
Zoom Video SDK for macOS
Zoom Video SDK for iOS
Zoom Video SDK for Android
Zoom Video SDK for Linux
Zoom Meeting SDK for Windows
Zoom Meeting SDK for macOS
Zoom Meeting SDK for iOS
Zoom Meeting SDK for Android
Zoom Meeting SDK for Linux
Software vendor:
Zoom Video Communications, Inc.
Zoom Video Communications, Inc.
Description
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to application does not properly control consumption of internal resources. A remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.
Remediation
Install updates from vendor's website.