The Zoom Client for Meetings for Windows installer before version 5.5.4 does not properly verify the signature of files with .msi, .ps1, and .bat extensions. This could lead to a malicious actor installing malicious software on a customer’s computer.
References
Link | Resource |
---|---|
https://explore.zoom.us/en/trust/security/security-bulletin | Vendor Advisory |
https://medium.com/manomano-tech/a-red-team-operation-leveraging-a-zero-day-vulnerability-in-zoom-80f57fb0822e | Third Party Advisory |
https://explore.zoom.us/en/trust/security/security-bulletin | Vendor Advisory |
https://medium.com/manomano-tech/a-red-team-operation-leveraging-a-zero-day-vulnerability-in-zoom-80f57fb0822e | Third Party Advisory |
Configurations
History
21 Nov 2024, 06:10
Type | Values Removed | Values Added |
---|---|---|
References | () https://explore.zoom.us/en/trust/security/security-bulletin - Vendor Advisory | |
References | () https://medium.com/manomano-tech/a-red-team-operation-leveraging-a-zero-day-vulnerability-in-zoom-80f57fb0822e - Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 4.3
v3 : 4.7 |
Information
Published : 2021-11-11 23:15
Updated : 2024-11-21 06:10
NVD link : CVE-2021-34420
Mitre link : CVE-2021-34420
CVE.ORG link : CVE-2021-34420
JSON object : View
Products Affected
zoom
- zoom_client_for_meetings
CWE
CWE-347
Improper Verification of Cryptographic Signature