Description
The Zoom Client for Meetings (for Android, iOS, Linux, macOS, and Windows) before version 5.11.0 are susceptible to a URL parsing vulnerability. If a malicious Zoom meeting URL is opened, the malicious link may direct the user to connect to an arbitrary network address, leading to additional attacks including the potential for remote code execution through launching executables from arbitrary paths.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-33194 | The Zoom Client for Meetings (for Android, iOS, Linux, macOS, and Windows) before version 5.11.0 are susceptible to a URL parsing vulnerability. If a malicious Zoom meeting URL is opened, the malicious link may direct the user to connect to an arbitrary network address, leading to additional attacks including the potential for remote code execution through launching executables from arbitrary paths. |
References
| Link | Providers |
|---|---|
| https://explore.zoom.us/en/trust/security/security-bulletin/ |
|
History
No history.
Status: PUBLISHED
Assigner: Zoom
Published:
Updated: 2024-09-17T02:53:24.397Z
Reserved: 2022-04-06T00:00:00.000Z
Link: CVE-2022-28755
No data.
Status : Modified
Published: 2022-08-11T15:15:12.357
Modified: 2024-11-21T06:57:52.257
Link: CVE-2022-28755
No data.
OpenCVE Enrichment
No data.
EUVD