#VU68630 Input validation error in Zoom Video Communications, Inc. Mobile applications


Published: 2022-10-25

Vulnerability identifier: #VU68630

Vulnerability risk: High

CVSSv3.1: 7.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-28763

CWE-ID: CWE-20

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Zoom Client for Windows
Client/Desktop applications / Office applications
Zoom Client for Linux
Client/Desktop applications / Office applications
Zoom Client for macOS
Client/Desktop applications / Office applications
Zoom Client for iOS
Mobile applications / Apps for mobile phones
Zoom Client for Android
Mobile applications / Apps for mobile phones

Vendor: Zoom Video Communications, Inc.

Description

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to insufficient parsing of URLs. A remote attacker can trick the victim into opening a specially crafted link and direct the user to connect to an arbitrary network address, leading to additional attacks including session takeovers.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Zoom Client for Windows: 5.0.0 23168.0427 - 5.12.0 8964

Zoom Client for Linux: 5.1.418436.0628 - 5.12.0 4682

Zoom Client for iOS: 5.0.0 23161.0427 - 5.12.0 4802

Zoom Client for macOS: 5.0.0 23186.0427 - 5.12.0 11129

Zoom Client for Android: 5.0.1 23478.0429 - 5.12.1 8902


External links
http://explore.zoom.us/en/trust/security/security-bulletin/#ZSB-22024


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability