Search criteria

69 vulnerabilities found for video_software_development_kit by zoom

FKIE_CVE-2024-45417

Vulnerability from fkie_nvd - Published: 2025-02-25 20:15 - Updated: 2025-03-04 17:36
Summary
Uncontrolled resource consumption in the installer for some Zoom apps for macOS before version 6.1.5 may allow a privileged user to conduct a disclosure of information via local access.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:macos:*:*",
              "matchCriteriaId": "93A03433-CCF8-4E19-89B4-18368847FB8F",
              "versionEndExcluding": "6.1.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:macos:*:*",
              "matchCriteriaId": "66BFFFB3-351E-43CE-B005-D24AB48B9584",
              "versionEndExcluding": "6.1.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:macos:*:*",
              "matchCriteriaId": "9B503B69-9BC0-4B91-BED9-0F2B5ACC0EC4",
              "versionEndExcluding": "6.1.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:macos:*:*",
              "matchCriteriaId": "627C5DC4-6AD9-4323-BBEA-4AB6557A29BF",
              "versionEndExcluding": "6.1.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Uncontrolled resource consumption in the installer for some Zoom apps for macOS before version 6.1.5 may allow a privileged user to conduct a disclosure of information via local access."
    },
    {
      "lang": "es",
      "value": "El consumo descontrolado de recursos en el instalador de algunas aplicaciones de Zoom para macOS anteriores a la versi\u00f3n 6.1.5 puede permitir que un usuario privilegiado realice una divulgaci\u00f3n de informaci\u00f3n a trav\u00e9s del acceso local."
    }
  ],
  "id": "CVE-2024-45417",
  "lastModified": "2025-03-04T17:36:57.857",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 6.0,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.2,
        "source": "security@zoom.us",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2025-02-25T20:15:35.007",
  "references": [
    {
      "source": "security@zoom.us",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24039/"
    }
  ],
  "sourceIdentifier": "security@zoom.us",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-708"
        }
      ],
      "source": "security@zoom.us",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2024-45418

Vulnerability from fkie_nvd - Published: 2025-02-25 20:15 - Updated: 2025-03-04 17:36
Summary
Symlink following in the installer for some Zoom apps for macOS before version 6.1.5 may allow an authenticated user to conduct an escalation of privilege via network access.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:macos:*:*",
              "matchCriteriaId": "93A03433-CCF8-4E19-89B4-18368847FB8F",
              "versionEndExcluding": "6.1.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:macos:*:*",
              "matchCriteriaId": "66BFFFB3-351E-43CE-B005-D24AB48B9584",
              "versionEndExcluding": "6.1.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:macos:*:*",
              "matchCriteriaId": "9B503B69-9BC0-4B91-BED9-0F2B5ACC0EC4",
              "versionEndExcluding": "6.1.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:macos:*:*",
              "matchCriteriaId": "627C5DC4-6AD9-4323-BBEA-4AB6557A29BF",
              "versionEndExcluding": "6.1.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Symlink following in the installer for some Zoom apps for macOS before version 6.1.5 may allow an authenticated user to conduct an escalation of privilege via network access."
    },
    {
      "lang": "es",
      "value": "El enlace simb\u00f3lico que sigue en el instalador de algunas aplicaciones de Zoom para macOS anteriores a la versi\u00f3n 6.1.5 puede permitir que un usuario autenticado realice una escalada de privilegios a trav\u00e9s del acceso a la red."
    }
  ],
  "id": "CVE-2024-45418",
  "lastModified": "2025-03-04T17:36:43.377",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 2.7,
        "source": "security@zoom.us",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2025-02-25T20:15:35.223",
  "references": [
    {
      "source": "security@zoom.us",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24040/"
    }
  ],
  "sourceIdentifier": "security@zoom.us",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-61"
        }
      ],
      "source": "security@zoom.us",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-59"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2024-45421

Vulnerability from fkie_nvd - Published: 2025-02-25 20:15 - Updated: 2025-03-05 13:53

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:android:*:*",
              "matchCriteriaId": "FDAC7DED-7124-49DC-81FE-3A846C6FAC6B",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:iphone_os:*:*",
              "matchCriteriaId": "8E8DDD36-808D-4864-AA07-0760E4375FCA",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:linux:*:*",
              "matchCriteriaId": "49957FA5-35FF-40AC-B88E-A235FA00F639",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:macos:*:*",
              "matchCriteriaId": "B02E0B95-F342-4D19-9C56-0ED458942E09",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:windows:*:*",
              "matchCriteriaId": "6398CA4B-4E28-4004-A5AA-0FBFAC5D2D13",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:ipad_os:*:*",
              "matchCriteriaId": "0F555E18-C547-493A-A3C6-85D42B75C5C0",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:macos:*:*",
              "matchCriteriaId": "05EFB308-185E-41CD-9E1F-A6EAB1BE3314",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:windows:*:*",
              "matchCriteriaId": "7AC5BD11-4FF8-4BEA-9151-75E165750703",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:android:*:*",
              "matchCriteriaId": "8DF64BAE-8FB5-4FB1-AA60-F34DA38B7882",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:linux:*:*",
              "matchCriteriaId": "7C050E43-5F66-4F82-8725-6D4F86C2D7FC",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:macos:*:*",
              "matchCriteriaId": "78CF87EF-1F6A-4059-AA3F-C9EFAB6311E4",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:windows:*:*",
              "matchCriteriaId": "0E9FA665-AB32-4140-91F9-57E2EA14D837",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:android:*:*",
              "matchCriteriaId": "F7D73FAD-D117-46F1-A30F-B373103576BB",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:iphone_os:*:*",
              "matchCriteriaId": "1615D4AC-42A1-4A37-80E8-DD312EF7D9D3",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:linux:*:*",
              "matchCriteriaId": "C11934B8-2EFA-4274-ADAD-53447B0BC972",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:macos:*:*",
              "matchCriteriaId": "70AEFFD5-918F-4046-9856-C665C2DEF4C4",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:windows:*:*",
              "matchCriteriaId": "F18288EB-7820-4C47-A589-BF3DA06A75C0",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:workplace:*:*:*:*:*:android:*:*",
              "matchCriteriaId": "39EF83F4-626A-43F1-9312-147F65B1EC5E",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:workplace:*:*:*:*:*:iphone_os:*:*",
              "matchCriteriaId": "21D7D4E9-14DF-48CF-A9F9-A61408B59789",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:linux:*:*",
              "matchCriteriaId": "655AC669-B03B-4BDD-B578-F6F02FAD857E",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:macos:*:*",
              "matchCriteriaId": "8A311271-1418-4E8C-90B5-960E37592BAE",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:windows:*:*",
              "matchCriteriaId": "F401A8C2-F0DF-4EC9-B0C2-11D9EB1BED15",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:workplace_virtual_desktop_infrastructure:*:*:*:*:*:windows:*:*",
              "matchCriteriaId": "A8EE3AB9-DE5E-4141-9974-C735AEEF1DF0",
              "versionEndExcluding": "6.1.12",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in some Zoom Apps may allow an authenticated user to conduct an escalation of privilege via network access."
    },
    {
      "lang": "es",
      "value": "El desbordamiento del b\u00fafer en algunas aplicaciones de Zoom puede permitir que un usuario autenticado realice una escalada de privilegios a trav\u00e9s del acceso a la red."
    }
  ],
  "id": "CVE-2024-45421",
  "lastModified": "2025-03-05T13:53:35.033",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 6.0,
        "source": "security@zoom.us",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2025-02-25T20:15:35.400",
  "references": [
    {
      "source": "security@zoom.us",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24043/"
    }
  ],
  "sourceIdentifier": "security@zoom.us",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-122"
        }
      ],
      "source": "security@zoom.us",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2025-0147

Vulnerability from fkie_nvd - Published: 2025-01-30 20:15 - Updated: 2025-08-01 01:21
Summary
Type confusion in the Zoom Workplace App for Linux before 6.2.10 may allow an authorized user to conduct an escalation of privilege via network access.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:linux:*:*",
              "matchCriteriaId": "DF6F723D-B652-46B7-AD8F-A5FAAC477697",
              "versionEndExcluding": "6.2.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:linux:*:*",
              "matchCriteriaId": "9B31C8CD-3CBD-4AB1-87CB-11E66696BB84",
              "versionEndExcluding": "6.2.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:linux:*:*",
              "matchCriteriaId": "C7700D44-685C-4F73-B4E2-3C81765FFE1F",
              "versionEndExcluding": "6.2.10",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Type confusion in the Zoom Workplace App for Linux before 6.2.10 may allow an authorized user to conduct an escalation of privilege via network access."
    },
    {
      "lang": "es",
      "value": "La confusi\u00f3n de tipos en la aplicaci\u00f3n Zoom Workplace para Linux anterior a la versi\u00f3n 6.2.10 puede permitir que un usuario autorizado realice una escalada de privilegios a trav\u00e9s del acceso a la red."
    }
  ],
  "id": "CVE-2025-0147",
  "lastModified": "2025-08-01T01:21:38.710",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "security@zoom.us",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2025-01-30T20:15:35.253",
  "references": [
    {
      "source": "security@zoom.us",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-25006/"
    }
  ],
  "sourceIdentifier": "security@zoom.us",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-843"
        }
      ],
      "source": "security@zoom.us",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2025-0145

Vulnerability from fkie_nvd - Published: 2025-01-30 20:15 - Updated: 2025-08-20 12:38
Summary
Untrusted search path in the installer for some Zoom Workplace Apps for Windows may allow an authorized user to conduct an escalation of privilege via local access.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:windows:*:*",
              "matchCriteriaId": "A98C293E-D615-4807-B5D6-D3EACF6C2E5A",
              "versionEndExcluding": "6.2.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:windows:*:*",
              "matchCriteriaId": "5369DF52-B7F8-45BF-B431-747DFA54CF1E",
              "versionEndExcluding": "6.2.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:windows:*:*",
              "matchCriteriaId": "F57C8F45-FAE2-486D-83F4-0E938B62CBDB",
              "versionEndExcluding": "6.2.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:windows:*:*",
              "matchCriteriaId": "1126B8E5-38A9-4E00-9103-6C4EFDE6D60C",
              "versionEndExcluding": "6.2.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:windows:*:*",
              "matchCriteriaId": "6FC0F189-0F60-4EAB-9C35-0A62F06BFAC4",
              "versionEndExcluding": "6.2.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:workplace_virtual_desktop_infrastructure:*:*:*:*:*:windows:*:*",
              "matchCriteriaId": "645FDC99-C05E-4819-AA55-F9A80A98F567",
              "versionEndExcluding": "6.0.15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:workplace_virtual_desktop_infrastructure:*:*:*:*:*:windows:*:*",
              "matchCriteriaId": "9E06D46C-AE61-4533-A8F7-6E6CA9830155",
              "versionEndExcluding": "6.1.13",
              "versionStartIncluding": "6.0.16",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Untrusted search path in the installer for some Zoom Workplace Apps for Windows may allow an authorized user to conduct an escalation of privilege via local access."
    },
    {
      "lang": "es",
      "value": "La ruta de b\u00fasqueda no confiable en el instalador de algunas aplicaciones de Zoom Workplace para Windows puede permitir que un usuario autorizado realice una escalada de privilegios a trav\u00e9s del acceso local."
    }
  ],
  "id": "CVE-2025-0145",
  "lastModified": "2025-08-20T12:38:30.887",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "LOW",
          "baseScore": 4.6,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 1.5,
        "impactScore": 2.7,
        "source": "security@zoom.us",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2025-01-30T20:15:34.547",
  "references": [
    {
      "source": "security@zoom.us",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-25004/"
    }
  ],
  "sourceIdentifier": "security@zoom.us",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-426"
        }
      ],
      "source": "security@zoom.us",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2025-0144

Vulnerability from fkie_nvd - Published: 2025-01-30 20:15 - Updated: 2025-08-20 12:36

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:android:*:*",
              "matchCriteriaId": "24C34BE7-5D76-4269-BA59-A3F1D92AB89C",
              "versionEndExcluding": "6.2.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:iphone_os:*:*",
              "matchCriteriaId": "0FDB317B-3796-4462-99FE-4F8EA64A2B21",
              "versionEndExcluding": "6.2.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:linux:*:*",
              "matchCriteriaId": "3C4F07D8-FB5B-4C94-965B-EA8303E79B0F",
              "versionEndExcluding": "6.2.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:macos:*:*",
              "matchCriteriaId": "4B61C9F0-CDD7-4843-A95B-35BB013EA52E",
              "versionEndExcluding": "6.2.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:windows:*:*",
              "matchCriteriaId": "A98C293E-D615-4807-B5D6-D3EACF6C2E5A",
              "versionEndExcluding": "6.2.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:ipados:*:*",
              "matchCriteriaId": "031A7405-7D8F-4C3C-A03C-9DB330BB8D7D",
              "versionEndExcluding": "6.2.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:macos:*:*",
              "matchCriteriaId": "B74B66FB-1F90-4922-AEE8-85E07FC1D604",
              "versionEndExcluding": "6.2.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:windows:*:*",
              "matchCriteriaId": "5369DF52-B7F8-45BF-B431-747DFA54CF1E",
              "versionEndExcluding": "6.2.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:android:*:*",
              "matchCriteriaId": "758E029E-C3E3-4F81-B916-63EEF2B52100",
              "versionEndExcluding": "6.2.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:linux:*:*",
              "matchCriteriaId": "80F51FE1-8F38-4623-90C0-1A5A3F674102",
              "versionEndExcluding": "6.2.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:macos:*:*",
              "matchCriteriaId": "89C3A3DC-84C0-467C-8F34-C63A497773B3",
              "versionEndExcluding": "6.2.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:windows:*:*",
              "matchCriteriaId": "F57C8F45-FAE2-486D-83F4-0E938B62CBDB",
              "versionEndExcluding": "6.2.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:android:*:*",
              "matchCriteriaId": "7CC34BFF-968F-4084-B381-D537295DD43B",
              "versionEndExcluding": "6.2.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:iphone_os:*:*",
              "matchCriteriaId": "0BD54A14-0E43-45C7-9A06-F566A01A88B5",
              "versionEndExcluding": "6.2.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:linux:*:*",
              "matchCriteriaId": "6B97E992-19EB-4B47-A046-1C656E26349F",
              "versionEndExcluding": "6.2.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:macos:*:*",
              "matchCriteriaId": "697C24CB-BEF7-4305-A255-2E552F7D9012",
              "versionEndExcluding": "6.2.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:windows:*:*",
              "matchCriteriaId": "1126B8E5-38A9-4E00-9103-6C4EFDE6D60C",
              "versionEndExcluding": "6.2.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:workplace:*:*:*:*:*:android:*:*",
              "matchCriteriaId": "9C0D8576-B9C5-4597-B41C-33369B3B574D",
              "versionEndExcluding": "6.2.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:workplace:*:*:*:*:*:iphone_os:*:*",
              "matchCriteriaId": "DBBD2007-4200-485E-A7E4-88125182125F",
              "versionEndExcluding": "6.2.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:linux:*:*",
              "matchCriteriaId": "5ECF5B7E-9FEC-44AC-B122-E626F29A136D",
              "versionEndExcluding": "6.2.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:macos:*:*",
              "matchCriteriaId": "0E8C5ED8-5948-418B-B4E7-6D831368AF05",
              "versionEndExcluding": "6.2.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:windows:*:*",
              "matchCriteriaId": "6FC0F189-0F60-4EAB-9C35-0A62F06BFAC4",
              "versionEndExcluding": "6.2.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:workplace_virtual_desktop_infrastructure:*:*:*:*:*:windows:*:*",
              "matchCriteriaId": "645FDC99-C05E-4819-AA55-F9A80A98F567",
              "versionEndExcluding": "6.0.15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:workplace_virtual_desktop_infrastructure:*:*:*:*:*:windows:*:*",
              "matchCriteriaId": "9E06D46C-AE61-4533-A8F7-6E6CA9830155",
              "versionEndExcluding": "6.1.13",
              "versionStartIncluding": "6.0.16",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Out-of-bounds write in some Zoom Workplace Apps may allow an authorized user to conduct a loss of integrity via network access."
    },
    {
      "lang": "es",
      "value": "Fuera de los l\u00edmites la escritura en algunas aplicaciones de Zoom Workplace puede permitir que un usuario autorizado realice una p\u00e9rdida de integridad a trav\u00e9s del acceso a la red."
    }
  ],
  "id": "CVE-2025-0144",
  "lastModified": "2025-08-20T12:36:29.310",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 3.1,
          "baseSeverity": "LOW",
          "confidentialityImpact": "NONE",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.6,
        "impactScore": 1.4,
        "source": "security@zoom.us",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2025-01-30T20:15:34.210",
  "references": [
    {
      "source": "security@zoom.us",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-25003/"
    }
  ],
  "sourceIdentifier": "security@zoom.us",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "security@zoom.us",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2025-0143

Vulnerability from fkie_nvd - Published: 2025-01-30 20:15 - Updated: 2025-07-31 19:43
Summary
Out-of-bounds write in the Zoom Workplace App for Linux before version 6.2.5 may allow an unauthorized user to conduct a denial of service via network access.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:linux:*:*",
              "matchCriteriaId": "3C4F07D8-FB5B-4C94-965B-EA8303E79B0F",
              "versionEndExcluding": "6.2.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:linux:*:*",
              "matchCriteriaId": "6B97E992-19EB-4B47-A046-1C656E26349F",
              "versionEndExcluding": "6.2.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:linux:*:*",
              "matchCriteriaId": "5ECF5B7E-9FEC-44AC-B122-E626F29A136D",
              "versionEndExcluding": "6.2.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Out-of-bounds write in the Zoom Workplace App for Linux before version 6.2.5 may allow an unauthorized user to conduct a denial of service via network access."
    },
    {
      "lang": "es",
      "value": "Fuera de los l\u00edmites escrito en la aplicaci\u00f3n Zoom Workplace para Linux anterior a la versi\u00f3n 6.2.5 puede permitir que un usuario no autorizado realice una denegaci\u00f3n de servicio a trav\u00e9s del acceso a la red."
    }
  ],
  "id": "CVE-2025-0143",
  "lastModified": "2025-07-31T19:43:09.920",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 4.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 1.4,
        "source": "security@zoom.us",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2025-01-30T20:15:34.050",
  "references": [
    {
      "source": "security@zoom.us",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-25002/"
    }
  ],
  "sourceIdentifier": "security@zoom.us",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "security@zoom.us",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2025-0146

Vulnerability from fkie_nvd - Published: 2025-01-30 20:15 - Updated: 2025-08-01 01:25
Summary
Symlink following in the installer for Zoom Workplace App for macOS before 6.2.10 may allow an authenticated user to conduct a denial of service via local access.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:macos:*:*",
              "matchCriteriaId": "9626CBBF-7026-4D81-B9DA-19C51B6158AF",
              "versionEndExcluding": "6.2.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:macos:*:*",
              "matchCriteriaId": "8F50C67D-F5C5-4657-A412-543CDAA12044",
              "versionEndExcluding": "6.2.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:macos:*:*",
              "matchCriteriaId": "FB0BAA8F-B484-464E-A272-791F05D027BA",
              "versionEndExcluding": "6.2.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:macos:*:*",
              "matchCriteriaId": "FAC02888-2D6B-435D-9186-D11953AC680F",
              "versionEndExcluding": "6.2.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:macos:*:*",
              "matchCriteriaId": "0DC82EFB-CE1A-42CF-85A1-8D92E50BE782",
              "versionEndExcluding": "6.2.10",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Symlink following in the installer for Zoom Workplace App for macOS before 6.2.10 may allow an authenticated user to conduct a denial of service via local access."
    },
    {
      "lang": "es",
      "value": "El enlace simb\u00f3lico que sigue en el instalador de la aplicaci\u00f3n Zoom Workplace para macOS anterior a la versi\u00f3n 6.2.10 puede permitir que un usuario autenticado realice una denegaci\u00f3n de servicio a trav\u00e9s del acceso local."
    }
  ],
  "id": "CVE-2025-0146",
  "lastModified": "2025-08-01T01:25:11.140",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "LOW",
          "baseScore": 3.9,
          "baseSeverity": "LOW",
          "confidentialityImpact": "NONE",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 1.3,
        "impactScore": 2.5,
        "source": "security@zoom.us",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.0,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.3,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2025-01-30T20:15:34.907",
  "references": [
    {
      "source": "security@zoom.us",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-25005/"
    }
  ],
  "sourceIdentifier": "security@zoom.us",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-59"
        }
      ],
      "source": "security@zoom.us",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2024-45420

Vulnerability from fkie_nvd - Published: 2024-11-19 20:15 - Updated: 2025-08-19 14:10

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:android:*:*",
              "matchCriteriaId": "FDAC7DED-7124-49DC-81FE-3A846C6FAC6B",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:iphone_os:*:*",
              "matchCriteriaId": "8E8DDD36-808D-4864-AA07-0760E4375FCA",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:linux:*:*",
              "matchCriteriaId": "49957FA5-35FF-40AC-B88E-A235FA00F639",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:macos:*:*",
              "matchCriteriaId": "B02E0B95-F342-4D19-9C56-0ED458942E09",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:windows:*:*",
              "matchCriteriaId": "6398CA4B-4E28-4004-A5AA-0FBFAC5D2D13",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:ipados:*:*",
              "matchCriteriaId": "A3484384-C52C-41FF-91FC-5D0A2227CD83",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:macos:*:*",
              "matchCriteriaId": "05EFB308-185E-41CD-9E1F-A6EAB1BE3314",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:windows:*:*",
              "matchCriteriaId": "7AC5BD11-4FF8-4BEA-9151-75E165750703",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:android:*:*",
              "matchCriteriaId": "8DF64BAE-8FB5-4FB1-AA60-F34DA38B7882",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:linux:*:*",
              "matchCriteriaId": "7C050E43-5F66-4F82-8725-6D4F86C2D7FC",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:macos:*:*",
              "matchCriteriaId": "78CF87EF-1F6A-4059-AA3F-C9EFAB6311E4",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:windows:*:*",
              "matchCriteriaId": "0E9FA665-AB32-4140-91F9-57E2EA14D837",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:android:*:*",
              "matchCriteriaId": "F7D73FAD-D117-46F1-A30F-B373103576BB",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:iphone_os:*:*",
              "matchCriteriaId": "1615D4AC-42A1-4A37-80E8-DD312EF7D9D3",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:linux:*:*",
              "matchCriteriaId": "C11934B8-2EFA-4274-ADAD-53447B0BC972",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:macos:*:*",
              "matchCriteriaId": "70AEFFD5-918F-4046-9856-C665C2DEF4C4",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:windows:*:*",
              "matchCriteriaId": "F18288EB-7820-4C47-A589-BF3DA06A75C0",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:workplace:*:*:*:*:*:android:*:*",
              "matchCriteriaId": "39EF83F4-626A-43F1-9312-147F65B1EC5E",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:workplace:*:*:*:*:*:iphone_os:*:*",
              "matchCriteriaId": "21D7D4E9-14DF-48CF-A9F9-A61408B59789",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:linux:*:*",
              "matchCriteriaId": "655AC669-B03B-4BDD-B578-F6F02FAD857E",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:macos:*:*",
              "matchCriteriaId": "8A311271-1418-4E8C-90B5-960E37592BAE",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:windows:*:*",
              "matchCriteriaId": "F401A8C2-F0DF-4EC9-B0C2-11D9EB1BED15",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Uncontrolled resource consumption in some Zoom Apps before version 6.2.0 may allow an authenticated user to conduct a denial of service via network access."
    },
    {
      "lang": "es",
      "value": "El consumo descontrolado de recursos en algunas aplicaciones de Zoom anteriores a la versi\u00f3n 6.2.0 puede permitir que un usuario autenticado realice una denegaci\u00f3n de servicio a trav\u00e9s del acceso a la red."
    }
  ],
  "id": "CVE-2024-45420",
  "lastModified": "2025-08-19T14:10:52.250",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 4.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 1.4,
        "source": "security@zoom.us",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-11-19T20:15:31.200",
  "references": [
    {
      "source": "security@zoom.us",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24042"
    }
  ],
  "sourceIdentifier": "security@zoom.us",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-400"
        }
      ],
      "source": "security@zoom.us",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2024-45422

Vulnerability from fkie_nvd - Published: 2024-11-19 20:15 - Updated: 2025-08-19 14:08

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:android:*:*",
              "matchCriteriaId": "FDAC7DED-7124-49DC-81FE-3A846C6FAC6B",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:iphone_os:*:*",
              "matchCriteriaId": "8E8DDD36-808D-4864-AA07-0760E4375FCA",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:linux:*:*",
              "matchCriteriaId": "49957FA5-35FF-40AC-B88E-A235FA00F639",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:macos:*:*",
              "matchCriteriaId": "B02E0B95-F342-4D19-9C56-0ED458942E09",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:windows:*:*",
              "matchCriteriaId": "6398CA4B-4E28-4004-A5AA-0FBFAC5D2D13",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:ipados:*:*",
              "matchCriteriaId": "A3484384-C52C-41FF-91FC-5D0A2227CD83",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:macos:*:*",
              "matchCriteriaId": "05EFB308-185E-41CD-9E1F-A6EAB1BE3314",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:windows:*:*",
              "matchCriteriaId": "7AC5BD11-4FF8-4BEA-9151-75E165750703",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:android:*:*",
              "matchCriteriaId": "8DF64BAE-8FB5-4FB1-AA60-F34DA38B7882",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:linux:*:*",
              "matchCriteriaId": "7C050E43-5F66-4F82-8725-6D4F86C2D7FC",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:macos:*:*",
              "matchCriteriaId": "78CF87EF-1F6A-4059-AA3F-C9EFAB6311E4",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:windows:*:*",
              "matchCriteriaId": "0E9FA665-AB32-4140-91F9-57E2EA14D837",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:android:*:*",
              "matchCriteriaId": "F7D73FAD-D117-46F1-A30F-B373103576BB",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:iphone_os:*:*",
              "matchCriteriaId": "1615D4AC-42A1-4A37-80E8-DD312EF7D9D3",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:linux:*:*",
              "matchCriteriaId": "C11934B8-2EFA-4274-ADAD-53447B0BC972",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:macos:*:*",
              "matchCriteriaId": "70AEFFD5-918F-4046-9856-C665C2DEF4C4",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:windows:*:*",
              "matchCriteriaId": "F18288EB-7820-4C47-A589-BF3DA06A75C0",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:workplace:*:*:*:*:*:android:*:*",
              "matchCriteriaId": "39EF83F4-626A-43F1-9312-147F65B1EC5E",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:workplace:*:*:*:*:*:iphone_os:*:*",
              "matchCriteriaId": "21D7D4E9-14DF-48CF-A9F9-A61408B59789",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:linux:*:*",
              "matchCriteriaId": "655AC669-B03B-4BDD-B578-F6F02FAD857E",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:macos:*:*",
              "matchCriteriaId": "8A311271-1418-4E8C-90B5-960E37592BAE",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:windows:*:*",
              "matchCriteriaId": "F401A8C2-F0DF-4EC9-B0C2-11D9EB1BED15",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper input validation in some Zoom Apps before version 6.2.0 may allow an unauthenticated user to conduct a denial of service via network access."
    },
    {
      "lang": "es",
      "value": "La validaci\u00f3n de entrada incorrecta en algunas aplicaciones de Zoom anteriores a la versi\u00f3n 6.2.0 puede permitir que un usuario no autenticado realice una denegaci\u00f3n de servicio a trav\u00e9s del acceso a la red."
    }
  ],
  "id": "CVE-2024-45422",
  "lastModified": "2025-08-19T14:08:46.097",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.5,
        "source": "security@zoom.us",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-11-19T20:15:31.430",
  "references": [
    {
      "source": "security@zoom.us",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24044"
    }
  ],
  "sourceIdentifier": "security@zoom.us",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "security@zoom.us",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2024-45419

Vulnerability from fkie_nvd - Published: 2024-11-19 20:15 - Updated: 2025-08-19 14:22

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:android:*:*",
              "matchCriteriaId": "FDAC7DED-7124-49DC-81FE-3A846C6FAC6B",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:iphone_os:*:*",
              "matchCriteriaId": "8E8DDD36-808D-4864-AA07-0760E4375FCA",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:linux:*:*",
              "matchCriteriaId": "49957FA5-35FF-40AC-B88E-A235FA00F639",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:macos:*:*",
              "matchCriteriaId": "B02E0B95-F342-4D19-9C56-0ED458942E09",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:windows:*:*",
              "matchCriteriaId": "6398CA4B-4E28-4004-A5AA-0FBFAC5D2D13",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:ipados:*:*",
              "matchCriteriaId": "A3484384-C52C-41FF-91FC-5D0A2227CD83",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:macos:*:*",
              "matchCriteriaId": "05EFB308-185E-41CD-9E1F-A6EAB1BE3314",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:windows:*:*",
              "matchCriteriaId": "7AC5BD11-4FF8-4BEA-9151-75E165750703",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:android:*:*",
              "matchCriteriaId": "8DF64BAE-8FB5-4FB1-AA60-F34DA38B7882",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:linux:*:*",
              "matchCriteriaId": "7C050E43-5F66-4F82-8725-6D4F86C2D7FC",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:macos:*:*",
              "matchCriteriaId": "78CF87EF-1F6A-4059-AA3F-C9EFAB6311E4",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:android:*:*",
              "matchCriteriaId": "F7D73FAD-D117-46F1-A30F-B373103576BB",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:iphone_os:*:*",
              "matchCriteriaId": "1615D4AC-42A1-4A37-80E8-DD312EF7D9D3",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:linux:*:*",
              "matchCriteriaId": "C11934B8-2EFA-4274-ADAD-53447B0BC972",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:macos:*:*",
              "matchCriteriaId": "70AEFFD5-918F-4046-9856-C665C2DEF4C4",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:windows:*:*",
              "matchCriteriaId": "F18288EB-7820-4C47-A589-BF3DA06A75C0",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:workplace:*:*:*:*:*:android:*:*",
              "matchCriteriaId": "39EF83F4-626A-43F1-9312-147F65B1EC5E",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:workplace:*:*:*:*:*:iphone_os:*:*",
              "matchCriteriaId": "21D7D4E9-14DF-48CF-A9F9-A61408B59789",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:linux:*:*",
              "matchCriteriaId": "655AC669-B03B-4BDD-B578-F6F02FAD857E",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:macos:*:*",
              "matchCriteriaId": "8A311271-1418-4E8C-90B5-960E37592BAE",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:windows:*:*",
              "matchCriteriaId": "F401A8C2-F0DF-4EC9-B0C2-11D9EB1BED15",
              "versionEndExcluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:workplace_virtual_desktop_infrastructure:*:*:*:*:*:windows:*:*",
              "matchCriteriaId": "08CE31A1-63E5-4CCD-8588-CEB3B4B68A29",
              "versionEndExcluding": "6.0.14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zoom:workplace_virtual_desktop_infrastructure:*:*:*:*:*:windows:*:*",
              "matchCriteriaId": "C66DCB81-D040-4E51-AB22-58271A36A5DA",
              "versionEndExcluding": "6.1.12",
              "versionStartIncluding": "6.0.15",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper input validation in some Zoom Apps may allow an unauthenticated user to conduct a disclosure of information via network access."
    },
    {
      "lang": "es",
      "value": "La validaci\u00f3n de entrada incorrecta en algunas aplicaciones de Zoom puede permitir que un usuario no autenticado realice una divulgaci\u00f3n de informaci\u00f3n a trav\u00e9s del acceso a la red."
    }
  ],
  "id": "CVE-2024-45419",
  "lastModified": "2025-08-19T14:22:03.920",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 8.1,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.2,
        "source": "security@zoom.us",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-11-19T20:15:30.973",
  "references": [
    {
      "source": "security@zoom.us",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24041"
    }
  ],
  "sourceIdentifier": "security@zoom.us",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-252"
        }
      ],
      "source": "security@zoom.us",
      "type": "Secondary"
    }
  ]
}

CVE-2024-45421 (GCVE-0-2024-45421)

Vulnerability from cvelistv5 – Published: 2025-02-25 19:55 – Updated: 2025-02-25 20:09
VLAI?
Summary
Buffer overflow in some Zoom Apps may allow an authenticated user to conduct an escalation of privilege via network access.
CWE
  • CWE-122 - Heap-based Buffer Overflow
Assigner
Impacted products
Vendor Product Version
Zoom Communications, Inc Zoom Apps Affected: See references (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-45421",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-02-25T20:08:54.319536Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-02-25T20:09:12.193Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "MacOS",
            "Linux",
            "Windows",
            "iOS",
            "Android"
          ],
          "product": "Zoom Apps",
          "vendor": "Zoom Communications, Inc",
          "versions": [
            {
              "status": "affected",
              "version": "See references",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2024-11-12T13:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Buffer overflow in some Zoom Apps may allow an authenticated user to conduct an escalation of privilege via network access.\u003cbr\u003e"
            }
          ],
          "value": "Buffer overflow in some Zoom Apps may allow an authenticated user to conduct an escalation of privilege via network access."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-122",
              "description": "CWE-122 Heap-based Buffer Overflow",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-02-25T19:55:02.666Z",
        "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351",
        "shortName": "Zoom"
      },
      "references": [
        {
          "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24043/"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Zoom Apps - Buffer Overflow",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351",
    "assignerShortName": "Zoom",
    "cveId": "CVE-2024-45421",
    "datePublished": "2025-02-25T19:55:02.666Z",
    "dateReserved": "2024-08-28T21:50:25.332Z",
    "dateUpdated": "2025-02-25T20:09:12.193Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-45418 (GCVE-0-2024-45418)

Vulnerability from cvelistv5 – Published: 2025-02-25 19:52 – Updated: 2025-02-25 20:07
VLAI?
Summary
Symlink following in the installer for some Zoom apps for macOS before version 6.1.5 may allow an authenticated user to conduct an escalation of privilege via network access.
CWE
  • CWE-61 - UNIX Symbolic Link (Symlink) Following
Assigner
Impacted products
Vendor Product Version
Zoom Communications, Inc Zoom Apps for macOS Affected: 0 , < 6.1.5 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-45418",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-02-25T20:07:02.751886Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-02-25T20:07:09.959Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "MacOS"
          ],
          "product": "Zoom Apps for macOS",
          "vendor": "Zoom Communications, Inc",
          "versions": [
            {
              "lessThan": "6.1.5",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2024-11-12T13:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Symlink following in the installer for some Zoom apps for macOS before version 6.1.5 may allow an authenticated user to conduct an escalation of privilege via network access.\u003cbr\u003e\u003cbr\u003e"
            }
          ],
          "value": "Symlink following in the installer for some Zoom apps for macOS before version 6.1.5 may allow an authenticated user to conduct an escalation of privilege via network access."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-61",
              "description": "CWE-61: UNIX Symbolic Link (Symlink) Following",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-02-25T19:52:25.471Z",
        "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351",
        "shortName": "Zoom"
      },
      "references": [
        {
          "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24040/"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Zoom Apps for macOS - Symbolic Link Following",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351",
    "assignerShortName": "Zoom",
    "cveId": "CVE-2024-45418",
    "datePublished": "2025-02-25T19:52:25.471Z",
    "dateReserved": "2024-08-28T21:50:25.332Z",
    "dateUpdated": "2025-02-25T20:07:09.959Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-45417 (GCVE-0-2024-45417)

Vulnerability from cvelistv5 – Published: 2025-02-25 19:49 – Updated: 2025-02-26 16:42
VLAI?
Summary
Uncontrolled resource consumption in the installer for some Zoom apps for macOS before version 6.1.5 may allow a privileged user to conduct a disclosure of information via local access.
CWE
  • CWE-708 - Incorrect Ownership Assignment
Assigner
Impacted products
Vendor Product Version
Zoom Communications, Inc Zoom Apps for macOS Affected: 0 , < 6.1.5 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-45417",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-02-26T16:41:05.991990Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-02-26T16:42:11.552Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "MacOS"
          ],
          "product": "Zoom Apps for macOS",
          "vendor": "Zoom Communications, Inc",
          "versions": [
            {
              "lessThan": "6.1.5",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2024-11-12T13:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Uncontrolled resource consumption in the installer for some Zoom apps for macOS before version 6.1.5 may allow a privileged user to conduct a disclosure of information via local access.\u003cbr\u003e\u003cbr\u003e"
            }
          ],
          "value": "Uncontrolled resource consumption in the installer for some Zoom apps for macOS before version 6.1.5 may allow a privileged user to conduct a disclosure of information via local access."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-708",
              "description": "CWE-708: Incorrect Ownership Assignment",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-02-25T19:49:22.296Z",
        "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351",
        "shortName": "Zoom"
      },
      "references": [
        {
          "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24039/"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Zoom Apps for macOS - Uncontrolled Resource Consumption",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351",
    "assignerShortName": "Zoom",
    "cveId": "CVE-2024-45417",
    "datePublished": "2025-02-25T19:49:22.296Z",
    "dateReserved": "2024-08-28T21:50:25.332Z",
    "dateUpdated": "2025-02-26T16:42:11.552Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-0147 (GCVE-0-2025-0147)

Vulnerability from cvelistv5 – Published: 2025-01-30 19:49 – Updated: 2025-01-30 20:08
VLAI?
Summary
Type confusion in the Zoom Workplace App for Linux before 6.2.10 may allow an authorized user to conduct an escalation of privilege via network access.
CWE
  • CWE-843 - Access of Resource Using Incompatible Type ('Type Confusion')
Assigner
Impacted products
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-0147",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-30T20:08:31.183815Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-30T20:08:44.020Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Linux"
          ],
          "product": "Zoom Workplace App for Linux",
          "vendor": "Zoom Communications, Inc",
          "versions": [
            {
              "lessThan": "6.2.10",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2025-01-14T13:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cb\u003e\u003cspan style=\"background-color: transparent;\"\u003eType confusion in the Zoom Workplace App for Linux before 6.2.10 may allow an authorized user to conduct an escalation of privilege via network access.\u003cbr\u003e\u003cbr\u003e\u003c/span\u003e\u003c/b\u003e"
            }
          ],
          "value": "Type confusion in the Zoom Workplace App for Linux before 6.2.10 may allow an authorized user to conduct an escalation of privilege via network access."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-843",
              "description": "CWE-843 Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-01-30T19:49:00.792Z",
        "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351",
        "shortName": "Zoom"
      },
      "references": [
        {
          "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-25006/"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Zoom Workplace App for Linux - Type Confusion",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351",
    "assignerShortName": "Zoom",
    "cveId": "CVE-2025-0147",
    "datePublished": "2025-01-30T19:49:00.792Z",
    "dateReserved": "2024-12-23T21:42:56.346Z",
    "dateUpdated": "2025-01-30T20:08:44.020Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-0146 (GCVE-0-2025-0146)

Vulnerability from cvelistv5 – Published: 2025-01-30 19:47 – Updated: 2025-01-30 21:22
VLAI?
Summary
Symlink following in the installer for Zoom Workplace App for macOS before 6.2.10 may allow an authenticated user to conduct a denial of service via local access.
CWE
  • CWE-59 - Improper Link Resolution Before File Access ('Link Following')
Assigner
Impacted products
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-0146",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-30T21:22:34.395616Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-30T21:22:42.397Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "MacOS"
          ],
          "product": "Zoom Workplace app for macOS",
          "vendor": "Zoom Communications, Inc",
          "versions": [
            {
              "lessThan": "6.2.10",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2025-01-14T13:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cb\u003e\u003cspan style=\"background-color: transparent;\"\u003eSymlink following in the installer for Zoom Workplace App for macOS before 6.2.10 may allow an authenticated user to conduct a denial of service via local access.\u003cbr\u003e\u003cbr\u003e\u003c/span\u003e\u003c/b\u003e"
            }
          ],
          "value": "Symlink following in the installer for Zoom Workplace App for macOS before 6.2.10 may allow an authenticated user to conduct a denial of service via local access."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "LOW",
            "baseScore": 3.9,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-59",
              "description": "CWE-59 Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-01-30T19:47:26.128Z",
        "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351",
        "shortName": "Zoom"
      },
      "references": [
        {
          "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-25005/"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Zoom Workplace app for macOS - Symlink Following",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351",
    "assignerShortName": "Zoom",
    "cveId": "CVE-2025-0146",
    "datePublished": "2025-01-30T19:47:26.128Z",
    "dateReserved": "2024-12-23T21:42:55.340Z",
    "dateUpdated": "2025-01-30T21:22:42.397Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-0145 (GCVE-0-2025-0145)

Vulnerability from cvelistv5 – Published: 2025-01-30 19:45 – Updated: 2025-01-30 21:23
VLAI?
Summary
Untrusted search path in the installer for some Zoom Workplace Apps for Windows may allow an authorized user to conduct an escalation of privilege via local access.
CWE
Assigner
Impacted products
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-0145",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-30T21:23:14.886270Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-30T21:23:22.776Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows"
          ],
          "product": "Zoom Workplace Apps for Windows",
          "vendor": "Zoom Communications, Inc",
          "versions": [
            {
              "status": "affected",
              "version": "see references",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2025-01-14T13:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cb\u003e\u003cspan style=\"background-color: transparent;\"\u003eUntrusted search path in the installer for some Zoom Workplace Apps for Windows may allow an authorized user to conduct an escalation of privilege via local access.\u003cbr\u003e\u003cbr\u003e\u003c/span\u003e\u003c/b\u003e"
            }
          ],
          "value": "Untrusted search path in the installer for some Zoom Workplace Apps for Windows may allow an authorized user to conduct an escalation of privilege via local access."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "LOW",
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-426",
              "description": "CWE-426 Untrusted Search Path",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-01-30T19:45:39.432Z",
        "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351",
        "shortName": "Zoom"
      },
      "references": [
        {
          "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-25004/"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Zoom Workplace Apps for Windows - Untrusted Search Path",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351",
    "assignerShortName": "Zoom",
    "cveId": "CVE-2025-0145",
    "datePublished": "2025-01-30T19:45:39.432Z",
    "dateReserved": "2024-12-23T21:42:54.089Z",
    "dateUpdated": "2025-01-30T21:23:22.776Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-0144 (GCVE-0-2025-0144)

Vulnerability from cvelistv5 – Published: 2025-01-30 19:44 – Updated: 2025-01-30 21:29
VLAI?
Summary
Out-of-bounds write in some Zoom Workplace Apps may allow an authorized user to conduct a loss of integrity via network access.
CWE
Assigner
Impacted products
Vendor Product Version
Zoom Communications, Inc Zoom Workplace Apps Affected: see references (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-0144",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-30T21:29:34.343068Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-30T21:29:47.382Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Linux",
            "MacOS",
            "Windows",
            "iOS",
            "Android"
          ],
          "product": "Zoom Workplace Apps",
          "vendor": "Zoom Communications, Inc",
          "versions": [
            {
              "status": "affected",
              "version": "see references",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2025-01-14T13:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cb\u003e\u003cspan style=\"background-color: transparent;\"\u003eOut-of-bounds write in some Zoom Workplace Apps may allow an authorized user to conduct a loss of integrity via network access.\u003cbr\u003e\u003c/span\u003e\u003c/b\u003e"
            }
          ],
          "value": "Out-of-bounds write in some Zoom Workplace Apps may allow an authorized user to conduct a loss of integrity via network access."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 3.1,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-787",
              "description": "CWE-787 Out-of-bounds Write",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-01-30T19:44:06.908Z",
        "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351",
        "shortName": "Zoom"
      },
      "references": [
        {
          "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-25003/"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Zoom Workplace Apps - Out-of-bounds Write",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351",
    "assignerShortName": "Zoom",
    "cveId": "CVE-2025-0144",
    "datePublished": "2025-01-30T19:44:06.908Z",
    "dateReserved": "2024-12-23T21:42:52.889Z",
    "dateUpdated": "2025-01-30T21:29:47.382Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-0143 (GCVE-0-2025-0143)

Vulnerability from cvelistv5 – Published: 2025-01-30 19:42 – Updated: 2025-01-31 15:38
VLAI?
Summary
Out-of-bounds write in the Zoom Workplace App for Linux before version 6.2.5 may allow an unauthorized user to conduct a denial of service via network access.
CWE
Assigner
Impacted products
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-0143",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-31T15:38:27.534732Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-31T15:38:36.360Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Linux"
          ],
          "product": "Zoom Workplace Apps for Linux",
          "vendor": "Zoom Communications, Inc",
          "versions": [
            {
              "lessThan": "6.2.5",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2025-01-14T13:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cb\u003e\u003cspan style=\"background-color: transparent;\"\u003eOut-of-bounds write in the Zoom Workplace App for Linux before version 6.2.5 may allow an unauthorized user to conduct a denial of service via network access.\u003cbr\u003e\u003c/span\u003e\u003c/b\u003e"
            }
          ],
          "value": "Out-of-bounds write in the Zoom Workplace App for Linux before version 6.2.5 may allow an unauthorized user to conduct a denial of service via network access."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-787",
              "description": "CWE-787 Out-of-bounds Write",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-01-30T19:49:23.761Z",
        "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351",
        "shortName": "Zoom"
      },
      "references": [
        {
          "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-25002/"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Zoom Workplace Apps for Linux - Out-of-bounds Write",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351",
    "assignerShortName": "Zoom",
    "cveId": "CVE-2025-0143",
    "datePublished": "2025-01-30T19:42:12.816Z",
    "dateReserved": "2024-12-23T21:42:49.173Z",
    "dateUpdated": "2025-01-31T15:38:36.360Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-45422 (GCVE-0-2024-45422)

Vulnerability from cvelistv5 – Published: 2024-11-19 19:45 – Updated: 2024-11-20 15:42
VLAI?
Summary
Improper input validation in some Zoom Apps before version 6.2.0 may allow an unauthenticated user to conduct a denial of service via network access.
CWE
  • CWE-20 - Improper Input Validation
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:zoom:workplace_app:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "workplace_app",
            "vendor": "zoom",
            "versions": [
              {
                "lessThan": "6.2.0",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:zoom:meeting_sdk:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "meeting_sdk",
            "vendor": "zoom",
            "versions": [
              {
                "lessThan": "6.2.0",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-45422",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-20T15:34:52.055891Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-20T15:42:40.830Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows",
            "MacOS",
            "Linux",
            "iOS",
            "Android"
          ],
          "product": "Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers",
          "vendor": "Zoom Communications Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "see references"
            }
          ]
        }
      ],
      "datePublic": "2024-11-12T13:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Improper input validation in some Zoom Apps before version 6.2.0 may allow an unauthenticated user to conduct a denial of service via network access."
            }
          ],
          "value": "Improper input validation in some Zoom Apps before version 6.2.0 may allow an unauthenticated user to conduct a denial of service via network access."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "CWE-20 Improper Input Validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-19T19:45:25.914Z",
        "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351",
        "shortName": "Zoom"
      },
      "references": [
        {
          "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24044"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Zoom Apps - Improper Input Validation",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351",
    "assignerShortName": "Zoom",
    "cveId": "CVE-2024-45422",
    "datePublished": "2024-11-19T19:45:25.914Z",
    "dateReserved": "2024-08-28T21:50:25.332Z",
    "dateUpdated": "2024-11-20T15:42:40.830Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-45420 (GCVE-0-2024-45420)

Vulnerability from cvelistv5 – Published: 2024-11-19 19:32 – Updated: 2024-11-20 15:16
VLAI?
Summary
Uncontrolled resource consumption in some Zoom Apps before version 6.2.0 may allow an authenticated user to conduct a denial of service via network access.
CWE
  • CWE-400 - Uncontrolled Resource Consumption
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-45420",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-20T15:11:13.010896Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-20T15:16:27.856Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows",
            "MacOS",
            "Linux",
            "iOS",
            "Android"
          ],
          "product": "Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers",
          "vendor": "Zoom Communications Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "see references"
            }
          ]
        }
      ],
      "datePublic": "2024-11-12T13:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: rgb(247, 247, 248);\"\u003eUncontrolled resource consumption in some Zoom Apps before version 6.2.0 may allow an authenticated user to conduct a denial of service via network access.\u003c/span\u003e\u003cbr\u003e"
            }
          ],
          "value": "Uncontrolled resource consumption in some Zoom Apps before version 6.2.0 may allow an authenticated user to conduct a denial of service via network access."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-400",
              "description": "CWE-400 Uncontrolled Resource Consumption",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-19T19:32:02.656Z",
        "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351",
        "shortName": "Zoom"
      },
      "references": [
        {
          "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24042"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Zoom Apps - Uncontrolled Resource Consumption",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351",
    "assignerShortName": "Zoom",
    "cveId": "CVE-2024-45420",
    "datePublished": "2024-11-19T19:32:02.656Z",
    "dateReserved": "2024-08-28T21:50:25.332Z",
    "dateUpdated": "2024-11-20T15:16:27.856Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-45421 (GCVE-0-2024-45421)

Vulnerability from nvd – Published: 2025-02-25 19:55 – Updated: 2025-02-25 20:09
VLAI?
Summary
Buffer overflow in some Zoom Apps may allow an authenticated user to conduct an escalation of privilege via network access.
CWE
  • CWE-122 - Heap-based Buffer Overflow
Assigner
Impacted products
Vendor Product Version
Zoom Communications, Inc Zoom Apps Affected: See references (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-45421",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-02-25T20:08:54.319536Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-02-25T20:09:12.193Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "MacOS",
            "Linux",
            "Windows",
            "iOS",
            "Android"
          ],
          "product": "Zoom Apps",
          "vendor": "Zoom Communications, Inc",
          "versions": [
            {
              "status": "affected",
              "version": "See references",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2024-11-12T13:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Buffer overflow in some Zoom Apps may allow an authenticated user to conduct an escalation of privilege via network access.\u003cbr\u003e"
            }
          ],
          "value": "Buffer overflow in some Zoom Apps may allow an authenticated user to conduct an escalation of privilege via network access."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-122",
              "description": "CWE-122 Heap-based Buffer Overflow",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-02-25T19:55:02.666Z",
        "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351",
        "shortName": "Zoom"
      },
      "references": [
        {
          "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24043/"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Zoom Apps - Buffer Overflow",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351",
    "assignerShortName": "Zoom",
    "cveId": "CVE-2024-45421",
    "datePublished": "2025-02-25T19:55:02.666Z",
    "dateReserved": "2024-08-28T21:50:25.332Z",
    "dateUpdated": "2025-02-25T20:09:12.193Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-45418 (GCVE-0-2024-45418)

Vulnerability from nvd – Published: 2025-02-25 19:52 – Updated: 2025-02-25 20:07
VLAI?
Summary
Symlink following in the installer for some Zoom apps for macOS before version 6.1.5 may allow an authenticated user to conduct an escalation of privilege via network access.
CWE
  • CWE-61 - UNIX Symbolic Link (Symlink) Following
Assigner
Impacted products
Vendor Product Version
Zoom Communications, Inc Zoom Apps for macOS Affected: 0 , < 6.1.5 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-45418",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-02-25T20:07:02.751886Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-02-25T20:07:09.959Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "MacOS"
          ],
          "product": "Zoom Apps for macOS",
          "vendor": "Zoom Communications, Inc",
          "versions": [
            {
              "lessThan": "6.1.5",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2024-11-12T13:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Symlink following in the installer for some Zoom apps for macOS before version 6.1.5 may allow an authenticated user to conduct an escalation of privilege via network access.\u003cbr\u003e\u003cbr\u003e"
            }
          ],
          "value": "Symlink following in the installer for some Zoom apps for macOS before version 6.1.5 may allow an authenticated user to conduct an escalation of privilege via network access."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-61",
              "description": "CWE-61: UNIX Symbolic Link (Symlink) Following",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-02-25T19:52:25.471Z",
        "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351",
        "shortName": "Zoom"
      },
      "references": [
        {
          "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24040/"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Zoom Apps for macOS - Symbolic Link Following",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351",
    "assignerShortName": "Zoom",
    "cveId": "CVE-2024-45418",
    "datePublished": "2025-02-25T19:52:25.471Z",
    "dateReserved": "2024-08-28T21:50:25.332Z",
    "dateUpdated": "2025-02-25T20:07:09.959Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-45417 (GCVE-0-2024-45417)

Vulnerability from nvd – Published: 2025-02-25 19:49 – Updated: 2025-02-26 16:42
VLAI?
Summary
Uncontrolled resource consumption in the installer for some Zoom apps for macOS before version 6.1.5 may allow a privileged user to conduct a disclosure of information via local access.
CWE
  • CWE-708 - Incorrect Ownership Assignment
Assigner
Impacted products
Vendor Product Version
Zoom Communications, Inc Zoom Apps for macOS Affected: 0 , < 6.1.5 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-45417",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-02-26T16:41:05.991990Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-02-26T16:42:11.552Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "MacOS"
          ],
          "product": "Zoom Apps for macOS",
          "vendor": "Zoom Communications, Inc",
          "versions": [
            {
              "lessThan": "6.1.5",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2024-11-12T13:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Uncontrolled resource consumption in the installer for some Zoom apps for macOS before version 6.1.5 may allow a privileged user to conduct a disclosure of information via local access.\u003cbr\u003e\u003cbr\u003e"
            }
          ],
          "value": "Uncontrolled resource consumption in the installer for some Zoom apps for macOS before version 6.1.5 may allow a privileged user to conduct a disclosure of information via local access."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-708",
              "description": "CWE-708: Incorrect Ownership Assignment",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-02-25T19:49:22.296Z",
        "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351",
        "shortName": "Zoom"
      },
      "references": [
        {
          "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24039/"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Zoom Apps for macOS - Uncontrolled Resource Consumption",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351",
    "assignerShortName": "Zoom",
    "cveId": "CVE-2024-45417",
    "datePublished": "2025-02-25T19:49:22.296Z",
    "dateReserved": "2024-08-28T21:50:25.332Z",
    "dateUpdated": "2025-02-26T16:42:11.552Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-0147 (GCVE-0-2025-0147)

Vulnerability from nvd – Published: 2025-01-30 19:49 – Updated: 2025-01-30 20:08
VLAI?
Summary
Type confusion in the Zoom Workplace App for Linux before 6.2.10 may allow an authorized user to conduct an escalation of privilege via network access.
CWE
  • CWE-843 - Access of Resource Using Incompatible Type ('Type Confusion')
Assigner
Impacted products
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-0147",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-30T20:08:31.183815Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-30T20:08:44.020Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Linux"
          ],
          "product": "Zoom Workplace App for Linux",
          "vendor": "Zoom Communications, Inc",
          "versions": [
            {
              "lessThan": "6.2.10",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2025-01-14T13:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cb\u003e\u003cspan style=\"background-color: transparent;\"\u003eType confusion in the Zoom Workplace App for Linux before 6.2.10 may allow an authorized user to conduct an escalation of privilege via network access.\u003cbr\u003e\u003cbr\u003e\u003c/span\u003e\u003c/b\u003e"
            }
          ],
          "value": "Type confusion in the Zoom Workplace App for Linux before 6.2.10 may allow an authorized user to conduct an escalation of privilege via network access."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-843",
              "description": "CWE-843 Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-01-30T19:49:00.792Z",
        "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351",
        "shortName": "Zoom"
      },
      "references": [
        {
          "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-25006/"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Zoom Workplace App for Linux - Type Confusion",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351",
    "assignerShortName": "Zoom",
    "cveId": "CVE-2025-0147",
    "datePublished": "2025-01-30T19:49:00.792Z",
    "dateReserved": "2024-12-23T21:42:56.346Z",
    "dateUpdated": "2025-01-30T20:08:44.020Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-0146 (GCVE-0-2025-0146)

Vulnerability from nvd – Published: 2025-01-30 19:47 – Updated: 2025-01-30 21:22
VLAI?
Summary
Symlink following in the installer for Zoom Workplace App for macOS before 6.2.10 may allow an authenticated user to conduct a denial of service via local access.
CWE
  • CWE-59 - Improper Link Resolution Before File Access ('Link Following')
Assigner
Impacted products
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-0146",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-30T21:22:34.395616Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-30T21:22:42.397Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "MacOS"
          ],
          "product": "Zoom Workplace app for macOS",
          "vendor": "Zoom Communications, Inc",
          "versions": [
            {
              "lessThan": "6.2.10",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2025-01-14T13:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cb\u003e\u003cspan style=\"background-color: transparent;\"\u003eSymlink following in the installer for Zoom Workplace App for macOS before 6.2.10 may allow an authenticated user to conduct a denial of service via local access.\u003cbr\u003e\u003cbr\u003e\u003c/span\u003e\u003c/b\u003e"
            }
          ],
          "value": "Symlink following in the installer for Zoom Workplace App for macOS before 6.2.10 may allow an authenticated user to conduct a denial of service via local access."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "LOW",
            "baseScore": 3.9,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-59",
              "description": "CWE-59 Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-01-30T19:47:26.128Z",
        "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351",
        "shortName": "Zoom"
      },
      "references": [
        {
          "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-25005/"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Zoom Workplace app for macOS - Symlink Following",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351",
    "assignerShortName": "Zoom",
    "cveId": "CVE-2025-0146",
    "datePublished": "2025-01-30T19:47:26.128Z",
    "dateReserved": "2024-12-23T21:42:55.340Z",
    "dateUpdated": "2025-01-30T21:22:42.397Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-0145 (GCVE-0-2025-0145)

Vulnerability from nvd – Published: 2025-01-30 19:45 – Updated: 2025-01-30 21:23
VLAI?
Summary
Untrusted search path in the installer for some Zoom Workplace Apps for Windows may allow an authorized user to conduct an escalation of privilege via local access.
CWE
Assigner
Impacted products
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-0145",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-30T21:23:14.886270Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-30T21:23:22.776Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows"
          ],
          "product": "Zoom Workplace Apps for Windows",
          "vendor": "Zoom Communications, Inc",
          "versions": [
            {
              "status": "affected",
              "version": "see references",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2025-01-14T13:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cb\u003e\u003cspan style=\"background-color: transparent;\"\u003eUntrusted search path in the installer for some Zoom Workplace Apps for Windows may allow an authorized user to conduct an escalation of privilege via local access.\u003cbr\u003e\u003cbr\u003e\u003c/span\u003e\u003c/b\u003e"
            }
          ],
          "value": "Untrusted search path in the installer for some Zoom Workplace Apps for Windows may allow an authorized user to conduct an escalation of privilege via local access."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "LOW",
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-426",
              "description": "CWE-426 Untrusted Search Path",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-01-30T19:45:39.432Z",
        "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351",
        "shortName": "Zoom"
      },
      "references": [
        {
          "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-25004/"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Zoom Workplace Apps for Windows - Untrusted Search Path",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351",
    "assignerShortName": "Zoom",
    "cveId": "CVE-2025-0145",
    "datePublished": "2025-01-30T19:45:39.432Z",
    "dateReserved": "2024-12-23T21:42:54.089Z",
    "dateUpdated": "2025-01-30T21:23:22.776Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-0144 (GCVE-0-2025-0144)

Vulnerability from nvd – Published: 2025-01-30 19:44 – Updated: 2025-01-30 21:29
VLAI?
Summary
Out-of-bounds write in some Zoom Workplace Apps may allow an authorized user to conduct a loss of integrity via network access.
CWE
Assigner
Impacted products
Vendor Product Version
Zoom Communications, Inc Zoom Workplace Apps Affected: see references (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-0144",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-30T21:29:34.343068Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-30T21:29:47.382Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Linux",
            "MacOS",
            "Windows",
            "iOS",
            "Android"
          ],
          "product": "Zoom Workplace Apps",
          "vendor": "Zoom Communications, Inc",
          "versions": [
            {
              "status": "affected",
              "version": "see references",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2025-01-14T13:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cb\u003e\u003cspan style=\"background-color: transparent;\"\u003eOut-of-bounds write in some Zoom Workplace Apps may allow an authorized user to conduct a loss of integrity via network access.\u003cbr\u003e\u003c/span\u003e\u003c/b\u003e"
            }
          ],
          "value": "Out-of-bounds write in some Zoom Workplace Apps may allow an authorized user to conduct a loss of integrity via network access."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 3.1,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-787",
              "description": "CWE-787 Out-of-bounds Write",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-01-30T19:44:06.908Z",
        "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351",
        "shortName": "Zoom"
      },
      "references": [
        {
          "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-25003/"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Zoom Workplace Apps - Out-of-bounds Write",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351",
    "assignerShortName": "Zoom",
    "cveId": "CVE-2025-0144",
    "datePublished": "2025-01-30T19:44:06.908Z",
    "dateReserved": "2024-12-23T21:42:52.889Z",
    "dateUpdated": "2025-01-30T21:29:47.382Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-0143 (GCVE-0-2025-0143)

Vulnerability from nvd – Published: 2025-01-30 19:42 – Updated: 2025-01-31 15:38
VLAI?
Summary
Out-of-bounds write in the Zoom Workplace App for Linux before version 6.2.5 may allow an unauthorized user to conduct a denial of service via network access.
CWE
Assigner
Impacted products
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-0143",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-31T15:38:27.534732Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-31T15:38:36.360Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Linux"
          ],
          "product": "Zoom Workplace Apps for Linux",
          "vendor": "Zoom Communications, Inc",
          "versions": [
            {
              "lessThan": "6.2.5",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2025-01-14T13:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cb\u003e\u003cspan style=\"background-color: transparent;\"\u003eOut-of-bounds write in the Zoom Workplace App for Linux before version 6.2.5 may allow an unauthorized user to conduct a denial of service via network access.\u003cbr\u003e\u003c/span\u003e\u003c/b\u003e"
            }
          ],
          "value": "Out-of-bounds write in the Zoom Workplace App for Linux before version 6.2.5 may allow an unauthorized user to conduct a denial of service via network access."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-787",
              "description": "CWE-787 Out-of-bounds Write",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-01-30T19:49:23.761Z",
        "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351",
        "shortName": "Zoom"
      },
      "references": [
        {
          "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-25002/"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Zoom Workplace Apps for Linux - Out-of-bounds Write",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351",
    "assignerShortName": "Zoom",
    "cveId": "CVE-2025-0143",
    "datePublished": "2025-01-30T19:42:12.816Z",
    "dateReserved": "2024-12-23T21:42:49.173Z",
    "dateUpdated": "2025-01-31T15:38:36.360Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-45422 (GCVE-0-2024-45422)

Vulnerability from nvd – Published: 2024-11-19 19:45 – Updated: 2024-11-20 15:42
VLAI?
Summary
Improper input validation in some Zoom Apps before version 6.2.0 may allow an unauthenticated user to conduct a denial of service via network access.
CWE
  • CWE-20 - Improper Input Validation
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:zoom:workplace_app:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "workplace_app",
            "vendor": "zoom",
            "versions": [
              {
                "lessThan": "6.2.0",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:zoom:meeting_sdk:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "meeting_sdk",
            "vendor": "zoom",
            "versions": [
              {
                "lessThan": "6.2.0",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-45422",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-20T15:34:52.055891Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-20T15:42:40.830Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows",
            "MacOS",
            "Linux",
            "iOS",
            "Android"
          ],
          "product": "Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers",
          "vendor": "Zoom Communications Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "see references"
            }
          ]
        }
      ],
      "datePublic": "2024-11-12T13:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Improper input validation in some Zoom Apps before version 6.2.0 may allow an unauthenticated user to conduct a denial of service via network access."
            }
          ],
          "value": "Improper input validation in some Zoom Apps before version 6.2.0 may allow an unauthenticated user to conduct a denial of service via network access."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "CWE-20 Improper Input Validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-19T19:45:25.914Z",
        "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351",
        "shortName": "Zoom"
      },
      "references": [
        {
          "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24044"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Zoom Apps - Improper Input Validation",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351",
    "assignerShortName": "Zoom",
    "cveId": "CVE-2024-45422",
    "datePublished": "2024-11-19T19:45:25.914Z",
    "dateReserved": "2024-08-28T21:50:25.332Z",
    "dateUpdated": "2024-11-20T15:42:40.830Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}