Zoom fixed critical flaw CVE-2024-24691 in Windows software
2024-2-14 23:33:29 Author: securityaffairs.com(查看原文) 阅读量:10 收藏

Zoom fixed critical flaw CVE-2024-24691 in Windows software

Pierluigi Paganini February 14, 2024

Zoom addressed seven vulnerabilities in its desktop and mobile applications, including a critical flaw (CVE-2024-24691) affecting the Windows software.

The popular Video messaging giant Zoom released security updates to address seven vulnerabilities in its desktop and mobile applications, including a critical issue, tracked as CVE-2024-24691 (CVSS score of 9.6), in Windows software.

The vulnerability CVE-2024-24691 is an improper input validation bug that could be exploited by an attacker with network access to escalate privileges.

“Improper input validation in Zoom Desktop Client for Windows, Zoom VDI Client for Windows, and Zoom Meeting SDK for Windows may allow an unauthenticated user to conduct an escalation of privilege via network access.” reads the advisory.

The vulnerability impacts the following products:

  • Zoom Desktop Client for Windows before version 5.16.5
  • Zoom VDI Client for Windows before version 5.16.10 (excluding 5.14.14 and 5.15.12)
  • Zoom Rooms Client for Windows before version 5.17.0
  • Zoom Meeting SDK for Windows before version 5.16.5

The company also addressed a high-severity escalation of privilege vulnerability, tracked as CVE-2024-24697, impacting Windows software.

“Untrusted search path in some Zoom 32 bit Windows clients may allow an authenticated user to conduct an escalation of privilege via local access.” reads the advisory.

The issue impacts the following products:

  • Zoom Desktop Client for Windows before version 5.17.0
  • Zoom VDI Client for Windows before version 5.17.5 (excluding 5.15.15 and 5.16.12)
  • Zoom Meeting SDK for Windows before version 5.17.0
  • Zoom Rooms Client for Windows before version 5.17.0

The video messaging company also resolved a high-severity escalation of privilege defect in these Windows applications, noting that it can be exploited locally, without authentication.

Tracked as CVE-2024-24697 and described as an untrusted search path issue, the vulnerability impacts Desktop Client before version 5.17.0, VDI Client before version 5.17.5 (excluding 5.15.15 and 5.16.12), Meeting SDK before version 5.17.0, and Rooms Client before version 5.17.0.

Below is the complete list of the addressed issues:

ZSBTitleSeverityCVEDate PublishedDate Updated
ZSB-24008Zoom Desktop Client for Windows, Zoom VDI Client for Windows, and Zoom Meeting SDK for Windows – Improper Input ValidationCriticalCVE-2024-2469102/13/202402/13/2024
ZSB-24007Zoom Clients – Improper Input ValidationMediumCVE-2024-2469002/13/202402/13/2024
ZSB-24006Zoom Clients – Business Logic ErrorMediumCVE-2024-2469902/13/202402/13/2024
ZSB-24005Zoom Clients – Improper AuthenticationMediumCVE-2024-2469802/13/202402/13/2024
ZSB-24004Zoom Clients – Untrusted Search PathHighCVE-2024-2469702/13/202402/13/2024
ZSB-24003Zoom Desktop Client for Windows, Zoom VDI Client for Windows, and Zoom Meeting SDK for Windows – Improper Input ValidationMediumCVE-2024-2469602/13/202402/13/2024
ZSB-24002Zoom Desktop Client for Windows, Zoom VDI Client for Windows, and Zoom Meeting SDK for Windows – Improper Input ValidationMediumCVE-2024-2469502/13/202402/13/2024

It’s unclear if one of the above vulnerabilities has been actively exploited in the wild.

Zoom recommends its users to update their applications to the latest available releases as soon as possible.

In November 2023, the company fixed a critical vulnerability in Zoom Room allowed threat actors to take over meetings and steal sensitive data.

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, Zoom)




文章来源: https://securityaffairs.com/159121/security/zoom-crirical-cve-2024-24691.html
如有侵权请联系:admin#unsafe.sh