CVE-2021-34409

It was discovered that the installation packages of the Zoom Client for Meetings for MacOS (Standard and for IT Admin) installation before version 5.2.0, Zoom Client Plugin for Sharing iPhone/iPad before version 5.2.0, and Zoom Rooms for Conference before version 5.1.0, copy pre- and post- installation shell scripts to a user-writable directory. In the affected products listed below, a malicious actor with local access to a user's machine could use this flaw to potentially run arbitrary system commands in a higher privileged context during the installation process.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:zoom:meetings:*:*:*:*:*:macos:*:*
cpe:2.3:a:zoom:rooms:*:*:*:*:*:*:*:*
cpe:2.3:a:zoom:screen_sharing:*:*:*:*:*:ipados:*:*
cpe:2.3:a:zoom:screen_sharing:*:*:*:*:*:iphone_os:*:*

History

21 Nov 2024, 06:10

Type Values Removed Values Added
References () https://explore.zoom.us/en/trust/security/security-bulletin - Vendor Advisory () https://explore.zoom.us/en/trust/security/security-bulletin - Vendor Advisory

12 Jul 2022, 17:42

Type Values Removed Values Added
CWE CWE-269 CWE-732

14 Dec 2021, 20:15

Type Values Removed Values Added
References
  • {'url': 'https://explore.zoom.us/en/trust/security/security-bulletin/', 'name': 'https://explore.zoom.us/en/trust/security/security-bulletin/', 'tags': ['Vendor Advisory'], 'refsource': 'CONFIRM'}
  • (MISC) https://explore.zoom.us/en/trust/security/security-bulletin -
Summary User-writable pre and post-install scripts unpacked during the Zoom Client for Meetings for MacOS installation before version 5.2.0 allow for privilege escalation to root. It was discovered that the installation packages of the Zoom Client for Meetings for MacOS (Standard and for IT Admin) installation before version 5.2.0, Zoom Client Plugin for Sharing iPhone/iPad before version 5.2.0, and Zoom Rooms for Conference before version 5.1.0, copy pre- and post- installation shell scripts to a user-writable directory. In the affected products listed below, a malicious actor with local access to a user's machine could use this flaw to potentially run arbitrary system commands in a higher privileged context during the installation process.

06 Oct 2021, 17:02

Type Values Removed Values Added
CWE CWE-269
References (CONFIRM) https://explore.zoom.us/en/trust/security/security-bulletin/ - (CONFIRM) https://explore.zoom.us/en/trust/security/security-bulletin/ - Vendor Advisory
CPE cpe:2.3:a:zoom:meetings:*:*:*:*:*:macos:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 7.2
v3 : 7.8

01 Oct 2021, 21:15

Type Values Removed Values Added
References
  • {'url': 'https://cwe.mitre.org/data/definitions/379.html', 'name': 'https://cwe.mitre.org/data/definitions/379.html', 'tags': [], 'refsource': 'MISC'}
  • (CONFIRM) https://explore.zoom.us/en/trust/security/security-bulletin/ -

27 Sep 2021, 14:34

Type Values Removed Values Added
New CVE

Information

Published : 2021-09-27 14:15

Updated : 2024-11-21 06:10


NVD link : CVE-2021-34409

Mitre link : CVE-2021-34409

CVE.ORG link : CVE-2021-34409


JSON object : View

Products Affected

zoom

  • rooms
  • meetings
  • screen_sharing
CWE
CWE-732

Incorrect Permission Assignment for Critical Resource