CVE-2018-15715

Zoom clients on Windows (before version 4.1.34814.1119), Mac OS (before version 4.1.34801.1116), and Linux (2.4.129780.0915 and below) are vulnerable to unauthorized message processing. A remote unauthenticated attacker can spoof UDP messages from a meeting attendee or Zoom server in order to invoke functionality in the target client. This allows the attacker to remove attendees from meetings, spoof messages from users, or hijack shared screens.
References
Link Resource
https://www.tenable.com/security/research/tra-2018-40 Exploit Third Party Advisory
https://www.tenable.com/security/research/tra-2018-40 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:zoom:zoom:*:*:*:*:*:linux:*:*
cpe:2.3:a:zoom:zoom:*:*:*:*:*:mac_os_x:*:*
cpe:2.3:a:zoom:zoom:*:*:*:*:*:windows:*:*

History

21 Nov 2024, 03:51

Type Values Removed Values Added
References () https://www.tenable.com/security/research/tra-2018-40 - Exploit, Third Party Advisory () https://www.tenable.com/security/research/tra-2018-40 - Exploit, Third Party Advisory

Information

Published : 2018-11-30 20:29

Updated : 2024-11-21 03:51


NVD link : CVE-2018-15715

Mitre link : CVE-2018-15715

CVE.ORG link : CVE-2018-15715


JSON object : View

Products Affected

zoom

  • zoom
CWE
CWE-290

Authentication Bypass by Spoofing

CWE-20

Improper Input Validation