Zoom Client < 5.10.0 Attack Chain Vulnerabilities

critical Nessus Plugin ID 161760

Synopsis

The remote host has an application installed that is affected by multiple vulnerabilities.

Description

The version of Zoom Client for Meetings for Windows installed on the remote host is prior to 5.10.0. It is, therefore, affected by multiple vulnerabilities.

- The Zoom Client for Meetings (for Android, iOS, Linux, MacOS, and Windows) before version 5.10.0 failed to properly parse XML stanzas in XMPP messages. (CVE-2022-22784)
- The Zoom Client for Meetings (for Android, iOS, Linux, MacOS, and Windows) before version 5.10.0 failed to properly constrain client session cookies to Zoom domains.
(CVE-2022-22785)
- The Zoom Client for Meetings for Windows before version 5.10.0 and Zoom Rooms for Conference Room for Windows before version 5.10.0, fails to properly check the installation version during the update process. (CVE-2022-22786)
- The Zoom Client for Meetings (for Android, iOS, Linux, macOS, and Windows) before version 5.10.0 fails to properly validate the hostname during a server switch request. (CVE-2022-22787)

Taken together, these vulnerabilities allow a unauthenticated, remote attacker can exploit this, via stringing these vulnerabilities together with a MitM attack, to cause Remote Code Execution without any user interaction.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Zoom Client for Meetings 5.10.0 or later.

See Also

https://explore.zoom.us/en/trust/security/security-bulletin

Plugin Details

Severity: Critical

ID: 161760

File Name: zoom_client_5_10_0.nasl

Version: 1.3

Type: local

Agent: windows

Family: Windows

Published: 6/1/2022

Updated: 10/26/2023

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2022-22786

CVSS v3

Risk Factor: Critical

Base Score: 9.1

Temporal Score: 8.2

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

CVSS Score Source: CVE-2022-22785

Vulnerability Information

CPE: cpe:/a:zoom:zoom, cpe:/a:zoom:meetings

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 5/17/2022

Vulnerability Publication Date: 5/17/2022

Reference Information

CVE: CVE-2022-22784, CVE-2022-22785, CVE-2022-22786, CVE-2022-22787