CVE-2020-11876

airhost.exe in Zoom Client for Meetings 4.6.11 uses the SHA-256 hash of 0123425234234fsdfsdr3242 for initialization of an OpenSSL EVP AES-256 CBC context. NOTE: the vendor states that this initialization only occurs within unreachable code
References
Link Resource
https://dev.io/posts/zoomzoo/ Exploit Third Party Advisory
https://dev.io/posts/zoomzoo/ Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:zoom:meetings:4.6.11:*:*:*:*:windows:*:*

History

21 Nov 2024, 04:58

Type Values Removed Values Added
References () https://dev.io/posts/zoomzoo/ - Exploit, Third Party Advisory () https://dev.io/posts/zoomzoo/ - Exploit, Third Party Advisory

07 Nov 2023, 03:15

Type Values Removed Values Added
Summary ** DISPUTED ** airhost.exe in Zoom Client for Meetings 4.6.11 uses the SHA-256 hash of 0123425234234fsdfsdr3242 for initialization of an OpenSSL EVP AES-256 CBC context. NOTE: the vendor states that this initialization only occurs within unreachable code. airhost.exe in Zoom Client for Meetings 4.6.11 uses the SHA-256 hash of 0123425234234fsdfsdr3242 for initialization of an OpenSSL EVP AES-256 CBC context. NOTE: the vendor states that this initialization only occurs within unreachable code

Information

Published : 2020-04-17 16:15

Updated : 2024-11-21 04:58


NVD link : CVE-2020-11876

Mitre link : CVE-2020-11876

CVE.ORG link : CVE-2020-11876


JSON object : View

Products Affected

zoom

  • meetings
CWE
CWE-327

Use of a Broken or Risky Cryptographic Algorithm