Security News > 2022 > May > New Zoom Flaws Could Let Attackers Hack Victims Just by Sending them a Message

New Zoom Flaws Could Let Attackers Hack Victims Just by Sending them a Message
2022-05-25 02:51

Popular video conferencing service Zoom has resolved as many as four security vulnerabilities, which could be exploited to compromise another user over chat by sending specially crafted Extensible Messaging and Presence Protocol messages and execute malicious code.

CVE-2022-22786 - Update package downgrade in Zoom Client for Meetings for Windows.

CVE-2022-22787 - Insufficient hostname validation during server switch in Zoom Client for Meetings.

With Zoom's chat functionality built on top of the XMPP standard, successful exploitation of the issues could enable an attacker to force a vulnerable client to masquerade a Zoom user, connect to a malicious server, and even download a rogue update, resulting in arbitrary code execution stemming from a downgrade attack.

Specifically, the exploit chain can be weaponized to hijack the software update mechanism and make the client connect to a man-in-the-middle server that serves up an old, less secure version of the Zoom client.

The patches arrive less than a month after Zoom addressed two high-severity flaws that could lead to local privilege escalation and exposure of memory content in its on-premise Meeting services.


News URL

https://thehackernews.com/2022/05/new-zoom-flaws-could-let-attackers-hack.html

Related Vulnerability

DATE CVE VULNERABILITY TITLE RISK
2022-05-18 CVE-2022-22787 Improper Certificate Validation vulnerability in Zoom Meetings
The Zoom Client for Meetings (for Android, iOS, Linux, macOS, and Windows) before version 5.10.0 fails to properly validate the hostname during a server switch request.
network
high complexity
zoom CWE-295
7.5
2022-05-18 CVE-2022-22786 Download of Code Without Integrity Check vulnerability in Zoom Meetings and Rooms
The Zoom Client for Meetings for Windows before version 5.10.0 and Zoom Rooms for Conference Room for Windows before version 5.10.0, fails to properly check the installation version during the update process.
network
low complexity
zoom CWE-494
8.8

Related vendor

VENDOR LAST 12M #/PRODUCTS LOW MEDIUM HIGH CRITICAL TOTAL VULNS
Zoom 54 4 51 80 12 147