The Zoom Client for Meetings (for Android, iOS, Linux, MacOS, and Windows) before version 5.10.0 failed to properly constrain client session cookies to Zoom domains. This issue could be used in a more sophisticated attack to send an unsuspecting users Zoom-scoped session cookies to a non-Zoom domain. This could potentially allow for spoofing of a Zoom user.
References
Link | Resource |
---|---|
https://explore.zoom.us/en/trust/security/security-bulletin | Vendor Advisory |
https://explore.zoom.us/en/trust/security/security-bulletin | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:47
Type | Values Removed | Values Added |
---|---|---|
References | () https://explore.zoom.us/en/trust/security/security-bulletin - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : 6.4
v3 : 5.9 |
Information
Published : 2022-05-18 16:15
Updated : 2024-11-21 06:47
NVD link : CVE-2022-22785
Mitre link : CVE-2022-22785
CVE.ORG link : CVE-2022-22785
JSON object : View
Products Affected
zoom
- meetings
CWE
CWE-565
Reliance on Cookies without Validation and Integrity Checking