The Zoom Client for Meetings (for Android, iOS, Linux, macOS, and Windows) before version 5.12.6 is susceptible to a local information exposure vulnerability. A failure to clear data from a local SQL database after a meeting ends and the usage of an insufficiently secure per-device key encrypting that database results in a local malicious user being able to obtain meeting information such as in-meeting chat for the previous meeting attended from that local user account.
References
Link | Resource |
---|---|
https://explore.zoom.us/en/trust/security/security-bulletin/ | Vendor Advisory |
https://explore.zoom.us/en/trust/security/security-bulletin/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:57
Type | Values Removed | Values Added |
---|---|---|
References | () https://explore.zoom.us/en/trust/security/security-bulletin/ - Vendor Advisory |
Information
Published : 2022-11-14 21:15
Updated : 2024-11-21 06:57
NVD link : CVE-2022-28764
Mitre link : CVE-2022-28764
CVE.ORG link : CVE-2022-28764
JSON object : View
Products Affected
zoom
- rooms
- meetings
- vdi_windows_meeting_clients