Zoom clients on Windows (before version 4.1.34814.1119), Mac OS (before version 4.1.34801.1116), and Linux (2.4.129780.0915 and below) are vulnerable to unauthorized message processing. A remote unauthenticated attacker can spoof UDP messages from a meeting attendee or Zoom server in order to invoke functionality in the target client. This allows the attacker to remove attendees from meetings, spoof messages from users, or hijack shared screens.
References
Link | Resource |
---|---|
https://www.tenable.com/security/research/tra-2018-40 | Exploit Third Party Advisory |
https://www.tenable.com/security/research/tra-2018-40 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 03:51
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.tenable.com/security/research/tra-2018-40 - Exploit, Third Party Advisory |
Information
Published : 2018-11-30 20:29
Updated : 2024-11-21 03:51
NVD link : CVE-2018-15715
Mitre link : CVE-2018-15715
CVE.ORG link : CVE-2018-15715
JSON object : View
Products Affected
zoom
- zoom