Article Details
Scrape Timestamp (UTC): 2024-02-15 15:32:20.641
Source: https://www.theregister.com/2024/02/15/zoom_privilege_escalation/
Original Article Text
Click to Toggle View
Zoom stomps critical privilege escalation bug plus 6 other flaws. All desktop and mobile apps vulnerable to at least one of the vulnerabilities. Video conferencing giant Zoom today opened up about a fresh batch of security vulnerabilities affecting its products, including a critical privilege escalation flaw. Tracked as CVE-2024-24691 with a CVSS score of 9.6, Zoom says the vulnerability may enable privilege escalation for unauthenticated users via network access. Limited technical details were disclosed, but an examination of the exploitability metrics that influenced the severity score shows that Zoom believes an exploit would require little complexity to execute, although some user interaction may be required. It's also deemed to have a potentially high impact on affected products, which include the Windows versions of the Zoom desktop client, VDI client, Rooms client, and Zoom Meeting SDK. Zoom Desktop Client for Windows before version 5.16.5 Zoom VDI Client for Windows before version 5.16.10 (excluding 5.14.14 and 5.15.12) Zoom Rooms Client for Windows before version 5.17.0 Zoom Meeting SDK for Windows before version 5.16.5 The vulnerability was reported by researchers in Zoom's Offensive Security division, and the company hasn't said whether any in-the-wild exploitation was detected. In any case, the severity of the vulnerability should be a cause for concern and prompt users into patching to the latest version. Also included in the round of updates were improper input validation vulnerabilities, as well as assorted others, although these were mostly all medium-severity issues, bar one. The other now-patched vulnerabilities were: CVE-2024-24690: A medium severity (5.4) flaw affecting various Zoom clients that could potentially lead to denial of service (DoS) attacks CVE-2024-24695: Another medium severity (6.8) vulnerability that could lead to information disclosure, but an attacker would need to be authenticated CVE-2024-24696: Similar to the above improper input validation issue. Same severity, affecting the same clients, with the same outcome. This one concerns the in-meeting chat functionality, though CVE-2024-24697: The only high severity (7.2) vulnerability here. Affecting some 32-bit Windows clients, this untrusted search path flaw could enable local privilege escalation for authenticated attackers CVE-2024-24698: A medium severity (4.9) issue affecting Zoom desktop apps (Windows, Mac, and Linux), mobile apps (Android and iOS), VDI client, Rooms client, and Meeting SDKs. It's classed as an improper authentication vulnerability that could lead to disclosure of information CVE-2024-24699: Also affecting all desktop and mobile apps, plus the Meeting SDKs and VDI and Rooms clients, this medium severity (6.5) flaw could lead to information disclosure over the network It's worth checking out each advisory for the specific versions affected as they do differ between the various vulnerabilities.
Daily Brief Summary
Zoom has disclosed a series of security vulnerabilities, including a critical privilege escalation flaw with a CVSS score of 9.6.
The critical vulnerability (CVE-2024-24691) could allow unauthenticated users to gain escalated privileges through network access.
Affected products include various Windows-based Zoom applications, with the company urging updates to the latest versions for security.
The security issues were identified by Zoom's Offensive Security division; however, no in-the-wild exploitation has been reported.
Additional vulnerabilities addressed include denial of service (DoS) risks, information disclosure flaws, and other medium-severity concerns.
One high-severity vulnerability (CVE-2024-24697) could allow local privilege escalation for authenticated attackers on some 32-bit Windows clients.
All Zoom desktop apps, mobile apps, and various clients are affected by at least one of the disclosed vulnerabilities, necessitating a review of the advisories for version-specific details.