CVE-2021-34409

It was discovered that the installation packages of the Zoom Client for Meetings for MacOS (Standard and for IT Admin) installation before version 5.2.0, Zoom Client Plugin for Sharing iPhone/iPad before version 5.2.0, and Zoom Rooms for Conference before version 5.1.0, copy pre- and post- installation shell scripts to a user-writable directory. In the affected products listed below, a malicious actor with local access to a user's machine could use this flaw to potentially run arbitrary system commands in a higher privileged context during the installation process.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:zoom:meetings:*:*:*:*:*:macos:*:*
cpe:2.3:a:zoom:rooms:*:*:*:*:*:*:*:*
cpe:2.3:a:zoom:screen_sharing:*:*:*:*:*:ipados:*:*
cpe:2.3:a:zoom:screen_sharing:*:*:*:*:*:iphone_os:*:*

History

21 Nov 2024, 06:10

Type Values Removed Values Added
References () https://explore.zoom.us/en/trust/security/security-bulletin - Vendor Advisory () https://explore.zoom.us/en/trust/security/security-bulletin - Vendor Advisory

Information

Published : 2021-09-27 14:15

Updated : 2024-11-21 06:10


NVD link : CVE-2021-34409

Mitre link : CVE-2021-34409

CVE.ORG link : CVE-2021-34409


JSON object : View

Products Affected

zoom

  • screen_sharing
  • rooms
  • meetings
CWE
CWE-732

Incorrect Permission Assignment for Critical Resource