Overview
- Description
- It was discovered that the installation packages of the Zoom Client for Meetings for MacOS (Standard and for IT Admin) installation before version 5.2.0, Zoom Client Plugin for Sharing iPhone/iPad before version 5.2.0, and Zoom Rooms for Conference before version 5.1.0, copy pre- and post- installation shell scripts to a user-writable directory. In the affected products listed below, a malicious actor with local access to a user's machine could use this flaw to potentially run arbitrary system commands in a higher privileged context during the installation process.
- Source
- security@zoom.us
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 7.8
- Impact score
- 5.9
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 7.2
- Impact score
- 10
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-732
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:meetings:*:*:*:*:*:macos:*:*", "vulnerable": true, "matchCriteriaId": "37C37A72-A64B-4823-B1E1-4EB0B7283629", "versionEndExcluding": "5.2.0" }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BA912D24-7983-4F87-B845-7464F24EE239", "versionEndExcluding": "5.1.0" }, { "criteria": "cpe:2.3:a:zoom:screen_sharing:*:*:*:*:*:ipados:*:*", "vulnerable": true, "matchCriteriaId": "7B7ED4B1-5A0F-4738-AC25-46846F3D1127", "versionEndExcluding": "5.2.0" }, { "criteria": "cpe:2.3:a:zoom:screen_sharing:*:*:*:*:*:iphone_os:*:*", "vulnerable": true, "matchCriteriaId": "FC50FFA5-57A1-4E3C-A53B-8B0622A437FA", "versionEndExcluding": "5.2.0" } ], "operator": "OR" } ] } ]