Zoom addressed seven vulnerabilities in its desktop and mobile applications, including a critical flaw (CVE-2024-24691) affecting the Windows software.
The popular Video messaging giant Zoom released security updates to address seven vulnerabilities in its desktop and mobile applications, including a critical issue, tracked as CVE-2024-24691 (CVSS score of 9.6), in Windows software.
The vulnerability CVE-2024-24691 is an improper input validation bug that could be exploited by an attacker with network access to escalate privileges.
“Improper input validation in Zoom Desktop Client for Windows, Zoom VDI Client for Windows, and Zoom Meeting SDK for Windows may allow an unauthenticated user to conduct an escalation of privilege via network access.” reads the advisory.
The vulnerability impacts the following products:
- Zoom Desktop Client for Windows before version 5.16.5
- Zoom VDI Client for Windows before version 5.16.10 (excluding 5.14.14 and 5.15.12)
- Zoom Rooms Client for Windows before version 5.17.0
- Zoom Meeting SDK for Windows before version 5.16.5
The company also addressed a high-severity escalation of privilege vulnerability, tracked as CVE-2024-24697, impacting Windows software.
“Untrusted search path in some Zoom 32 bit Windows clients may allow an authenticated user to conduct an escalation of privilege via local access.” reads the advisory.
The issue impacts the following products:
- Zoom Desktop Client for Windows before version 5.17.0
- Zoom VDI Client for Windows before version 5.17.5 (excluding 5.15.15 and 5.16.12)
- Zoom Meeting SDK for Windows before version 5.17.0
- Zoom Rooms Client for Windows before version 5.17.0
The video messaging company also resolved a high-severity escalation of privilege defect in these Windows applications, noting that it can be exploited locally, without authentication.
Tracked as CVE-2024-24697 and described as an untrusted search path issue, the vulnerability impacts Desktop Client before version 5.17.0, VDI Client before version 5.17.5 (excluding 5.15.15 and 5.16.12), Meeting SDK before version 5.17.0, and Rooms Client before version 5.17.0.
Below is the complete list of the addressed issues:
ZSB | Title | Severity | CVE | Date Published | Date Updated |
---|---|---|---|---|---|
ZSB-24008 | Zoom Desktop Client for Windows, Zoom VDI Client for Windows, and Zoom Meeting SDK for Windows – Improper Input Validation | Critical | CVE-2024-24691 | 02/13/2024 | 02/13/2024 |
ZSB-24007 | Zoom Clients – Improper Input Validation | Medium | CVE-2024-24690 | 02/13/2024 | 02/13/2024 |
ZSB-24006 | Zoom Clients – Business Logic Error | Medium | CVE-2024-24699 | 02/13/2024 | 02/13/2024 |
ZSB-24005 | Zoom Clients – Improper Authentication | Medium | CVE-2024-24698 | 02/13/2024 | 02/13/2024 |
ZSB-24004 | Zoom Clients – Untrusted Search Path | High | CVE-2024-24697 | 02/13/2024 | 02/13/2024 |
ZSB-24003 | Zoom Desktop Client for Windows, Zoom VDI Client for Windows, and Zoom Meeting SDK for Windows – Improper Input Validation | Medium | CVE-2024-24696 | 02/13/2024 | 02/13/2024 |
ZSB-24002 | Zoom Desktop Client for Windows, Zoom VDI Client for Windows, and Zoom Meeting SDK for Windows – Improper Input Validation | Medium | CVE-2024-24695 | 02/13/2024 | 02/13/2024 |
It’s unclear if one of the above vulnerabilities has been actively exploited in the wild.
Zoom recommends its users to update their applications to the latest available releases as soon as possible.
In November 2023, the company fixed a critical vulnerability in Zoom Room allowed threat actors to take over meetings and steal sensitive data.
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
(SecurityAffairs – hacking, Zoom)