Vulnerabilities > CVE-2019-13450 - Missing Authorization vulnerability in multiple products

047910
CVSS 6.5 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
HIGH
Integrity impact
NONE
Availability impact
NONE
network
low complexity
ringcentral
zoom
CWE-862
nessus

Summary

In the Zoom Client through 4.4.4 and RingCentral 7.0.136380.0312 on macOS, remote attackers can force a user to join a video call with the video camera active. This occurs because any web site can interact with the Zoom web server on localhost port 19421 or 19424. NOTE: a machine remains vulnerable if the Zoom Client was installed in the past and then uninstalled. Blocking exploitation requires additional steps, such as the ZDisableVideo preference and/or killing the web server, deleting the ~/.zoomus directory, and creating a ~/.zoomus plain file.

Vulnerable Configurations

Part Description Count
Application
Ringcentral
1
Application
Zoom
124

Common Weakness Enumeration (CWE)

Nessus

NASL familyMacOS X Local Security Checks
NASL idMACOS_ZOOM_CLIENT_4_4_53932_0709.NASL
descriptionThe version of Zoom Client for Meetings installed on the remote macOS host is 4.x prior to 4.4.53932.0709. It is, therefore, affected by a webcam hijacking vulnerability. An unauthenticated, remote attacker can exploit this, by convincing a user to visit an attacker controlled website, to force a user to join an attacker controlled video call with their video camera active.
last seen2020-06-01
modified2020-06-02
plugin id126590
published2019-07-10
reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/126590
titleZoom Client for Meetings 4.x < 4.4.53932.0709 Webcam Hijacking Vulnerability (macOS)
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(126590);
  script_version("1.2");
  script_cvs_date("Date: 2019/10/18 23:14:14");

  script_cve_id("CVE-2019-13450");
  script_bugtraq_id(109082);

  script_name(english:"Zoom Client for Meetings 4.x < 4.4.53932.0709 Webcam Hijacking Vulnerability (macOS)");
  script_summary(english:"Checks the Zoom Client for Meetings version.");

  script_set_attribute(attribute:"synopsis", value:
"The remote host has an application installed that is affected by a webcam hijack vulnerability.");
  script_set_attribute(attribute:"description", value:
"The version of Zoom Client for Meetings installed on the remote macOS host is 4.x prior to 4.4.53932.0709. It is,
therefore, affected by a webcam hijacking vulnerability. An unauthenticated, remote attacker can exploit this, by
convincing a user to visit an attacker controlled website, to force a user to join an attacker controlled video call
with their video camera active.");
  # https://medium.com/bugbountywriteup/zoom-zero-day-4-million-webcams-maybe-an-rce-just-get-them-to-visit-your-website-ac75c83f4ef5
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?43720b3e");
  # https://blog.zoom.us/wordpress/2019/07/08/response-to-video-on-concern/
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?1394c56f");
  script_set_attribute(attribute:"solution", value:
"Upgrade to Zoom Client for Meetings 4.4.53932.0709 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2019-13450");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");

  script_set_attribute(attribute:"vuln_publication_date", value:"2019/07/08");
  script_set_attribute(attribute:"patch_publication_date", value:"2019/07/09");
  script_set_attribute(attribute:"plugin_publication_date", value:"2019/07/10");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"x-cpe:/a:zoom:zoom_client_for_meetings");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"MacOS X Local Security Checks");

  script_copyright(english:"This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("macosx_zoom_installed.nbin");
  script_require_keys("Host/MacOSX/Version", "installed_sw/zoom");

  exit(0);
}

include("vcf.inc");

get_kb_item_or_exit("Host/MacOSX/Version");

app_info = vcf::get_app_info(app:"zoom");

vcf::check_granularity(app_info:app_info, sig_segments:3);

constraints = [
  { "min_version" : "4", "fixed_version" : "4.4.53932.0709" }
];

vcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_WARNING);

The Hacker News