- Description
- It was discovered that the installation packages of the Zoom Client for Meetings for MacOS (Standard and for IT Admin) installation before version 5.2.0, Zoom Client Plugin for Sharing iPhone/iPad before version 5.2.0, and Zoom Rooms for Conference before version 5.1.0, copy pre- and post- installation shell scripts to a user-writable directory. In the affected products listed below, a malicious actor with local access to a user's machine could use this flaw to potentially run arbitrary system commands in a higher privileged context during the installation process.
- Source
- security@zoom.us
- NVD status
- Analyzed
CVSS 3.1
- Type
- Primary
- Base score
- 7.8
- Impact score
- 5.9
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 7.2
- Impact score
- 10
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:C/I:C/A:C
- nvd@nist.gov
- CWE-732
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:zoom:meetings:*:*:*:*:*:macos:*:*",
"vulnerable": true,
"matchCriteriaId": "37C37A72-A64B-4823-B1E1-4EB0B7283629",
"versionEndExcluding": "5.2.0"
},
{
"criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "BA912D24-7983-4F87-B845-7464F24EE239",
"versionEndExcluding": "5.1.0"
},
{
"criteria": "cpe:2.3:a:zoom:screen_sharing:*:*:*:*:*:ipados:*:*",
"vulnerable": true,
"matchCriteriaId": "7B7ED4B1-5A0F-4738-AC25-46846F3D1127",
"versionEndExcluding": "5.2.0"
},
{
"criteria": "cpe:2.3:a:zoom:screen_sharing:*:*:*:*:*:iphone_os:*:*",
"vulnerable": true,
"matchCriteriaId": "FC50FFA5-57A1-4E3C-A53B-8B0622A437FA",
"versionEndExcluding": "5.2.0"
}
],
"operator": "OR"
}
]
}
]