CVE-2022-28762

Zoom Client for Meetings for macOS (Standard and for IT Admin) starting with 5.10.6 and prior to 5.12.0 contains a debugging port misconfiguration. When camera mode rendering context is enabled as part of the Zoom App Layers API by running certain Zoom Apps, a local debugging port is opened by the Zoom client. A local malicious user could use this debugging port to connect to and control the Zoom Apps running in the Zoom client.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:zoom:meetings:*:*:*:*:*:macos:*:*

History

17 Oct 2022, 17:52

Type Values Removed Values Added
CPE cpe:2.3:a:zoom:meetings:*:*:*:*:*:macos:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CWE NVD-CWE-noinfo
References (MISC) https://explore.zoom.us/en/trust/security/security-bulletin/ - (MISC) https://explore.zoom.us/en/trust/security/security-bulletin/ - Vendor Advisory

14 Oct 2022, 15:29

Type Values Removed Values Added
New CVE

Information

Published : 2022-10-14 15:15

Updated : 2024-02-04 22:51


NVD link : CVE-2022-28762

Mitre link : CVE-2022-28762

CVE.ORG link : CVE-2022-28762


JSON object : View

Products Affected

zoom

  • meetings
CWE
NVD-CWE-noinfo CWE-16

Configuration