Vulnerability identifier: #VU77820
Vulnerability risk: Low
CVSSv3.1: 3.2 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-319
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Zoom Client for Windows
Client/Desktop applications /
Office applications
Zoom Client for macOS
Client/Desktop applications /
Office applications
Zoom Client for Linux
Client/Desktop applications /
Office applications
Zoom Rooms for Windows
Client/Desktop applications /
Office applications
Zoom Client for iOS
Mobile applications /
Apps for mobile phones
Zoom Client for Android
Mobile applications /
Apps for mobile phones
Zoom Rooms for macOS
Client/Desktop applications /
Messaging software
Zoom Meeting SDK for Windows
Universal components / Libraries /
Software for developers
Vendor: Zoom Video Communications, Inc.
Description
The vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to software did not use a per-meeting key to encrypt messages sent between user devices and Zoom, including messages sent during End-to-End Encrypted (E2EE) meetings.A remote attacker with ability to intercept and decrypt TLS communication can gain access to sensitive information.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
Zoom Client for Windows: 5.15.0 17890 - 5.15.1 17948
Zoom Client for macOS: 5.15.0 19644
Zoom Client for Linux: 5.15.0 4063
Zoom Client for iOS: 5.15.0 8765
Zoom Client for Android: 5.15.0 14500
Zoom Rooms for Windows: 5.15.0 2989
Zoom Rooms for macOS: 5.15.0 3588
Zoom Meeting SDK for Windows: 5.15.1
External links
http://explore.zoom.us/en/trust/security/security-bulletin/#ZSB-23025
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.