CVE-2022-28762

Zoom Client for Meetings for macOS (Standard and for IT Admin) starting with 5.10.6 and prior to 5.12.0 contains a debugging port misconfiguration. When camera mode rendering context is enabled as part of the Zoom App Layers API by running certain Zoom Apps, a local debugging port is opened by the Zoom client. A local malicious user could use this debugging port to connect to and control the Zoom Apps running in the Zoom client.
Configurations

Configuration 1 (hide)

cpe:2.3:a:zoom:meetings:*:*:*:*:*:macos:*:*

History

21 Nov 2024, 06:57

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 7.8
v2 : unknown
v3 : 7.3
References () https://explore.zoom.us/en/trust/security/security-bulletin/ - Vendor Advisory () https://explore.zoom.us/en/trust/security/security-bulletin/ - Vendor Advisory

17 Oct 2022, 17:52

Type Values Removed Values Added
CPE cpe:2.3:a:zoom:meetings:*:*:*:*:*:macos:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CWE NVD-CWE-noinfo
References (MISC) https://explore.zoom.us/en/trust/security/security-bulletin/ - (MISC) https://explore.zoom.us/en/trust/security/security-bulletin/ - Vendor Advisory

14 Oct 2022, 15:29

Type Values Removed Values Added
New CVE

Information

Published : 2022-10-14 15:15

Updated : 2024-11-21 06:57


NVD link : CVE-2022-28762

Mitre link : CVE-2022-28762

CVE.ORG link : CVE-2022-28762


JSON object : View

Products Affected

zoom

  • meetings
CWE
CWE-16

Configuration

NVD-CWE-noinfo