Summary
On 08/13/2024, Zoom issued security advisories urging users to patch two high severity vulnerabilities: CVE-2024-39818 (CVSSv3: 7.5), an information disclosure vulnerability that allows an authenticated user to perform information disclosure through network access and CVE-2024-39825 (CVSSv3: 8.5), a buffer overflow that allows an authenticated user to conduct an escalation of privilege using network access. The affected applications are Zoom Workplace Desktop App, Zoom Workplace VDI Client, Zoom Workplace App for Android and iOS, and Zoom Rooms Application for Windows, Mac, and iPad.
Impact
Only attackers authenticated to one of the affected Zoom applications could exploit these vulnerabilities, but if exploited, the vulnerabilities would enable an attacker to perform information disclosure and/or privilege escalation on the affected system. No evidence exists indicating the bugs were exploited or that proof-of-concept code is publicly available.
Affected Applications
CVE-2024-39818
- Zoom Workplace App for iOS before version 6.0.10
- Zoom Workplace Desktop App for Linux before version 6.0.10
- Zoom Workplace Desktop App for Windows before version 6.0.10
- Zoom Workplace Desktop App for macOS before version 6.0.10
- Zoom Workplace VDI Client for Windows before version 5.17.13
- Zoom Meeting SDK for Windows before version 6.0.10
- Zoom Meeting SDK for iOS before version 6.0.10
- Zoom Meeting SDK for Android before version 6.0.10
- Zoom Meeting SDK for macOS before version 6.0.10
- Zoom Meeting SDK for Linux before version 6.0.10
CVE-2024-39825
- Zoom Workplace Desktop App for Linux before version 6.0.0
- Zoom Workplace Desktop App for Windows before version 6.0.0
- Zoom Workplace Desktop App for macOS before version 6.0.0
- Zoom Workplace VDI Client for Windows before version 5.17.13
- Zoom Workplace App for iOS before version 6.0.0
- Zoom Workplace App for Android before version 6.0.0
- Zoom Rooms App for Windows before version 6.0.0
- Zoom Rooms App for Mac before version 6.0.0
- Zoom Rooms App for iPad before version 6.0.0
Remediation
Applying the latest updates as advised by the vendor is the remediation method. Zoom also has auto-update features in place which could be enabled to keep these applications up-to-date
Recommendations
Patch: We advise you to update the affected application(s) to the latest version at a normal priority. These vulnerabilities are not very high risk and can be mitigated through multifactor authentication.
Auto-update: It is always advised to implement automation to help with vulnerability remediation. In this case, setting up auto updating for these applications will assist in expediting any type of patch these applications would experience. This should be discussed with leadership in your organization as not every application should be patched automatically.
Associated Bulletins
ZSB-24025 | Zoom
ZSB-24022 | Zoom