Vulnerabilites related to Zoom Video Communications Inc - Zoom VDI Windows Meeting Client for Windows (32-bit)
cve-2022-28766
Vulnerability from cvelistv5
Published
2022-11-17 22:36
Modified
2024-09-16 22:31
Severity ?
EPSS score ?
Summary
Windows 32-bit versions of the Zoom Client for Meetings before 5.12.6 and Zoom Rooms for Conference Room before version 5.12.6 are susceptible to a DLL injection vulnerability. A local low-privileged user could exploit this vulnerability to run arbitrary code in the context of the Zoom client.
References
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Zoom Video Communications Inc | Zoom Client for Meetings for Windows (32-bit) |
Version: unspecified < 5.12.6 |
|||||||||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T06:03:52.736Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://explore.zoom.us/en/trust/security/security-bulletin/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Zoom Client for Meetings for Windows (32-bit)", vendor: "Zoom Video Communications Inc", versions: [ { lessThan: "5.12.6", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "Zoom VDI Windows Meeting Client for Windows (32-bit)", vendor: "Zoom Video Communications Inc", versions: [ { lessThan: "5.12.6", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "Zoom Rooms for Conference Room for Windows (32-bit)", vendor: "Zoom Video Communications Inc", versions: [ { lessThan: "5.12.6", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], datePublic: "2022-11-15T00:00:00", descriptions: [ { lang: "en", value: "Windows 32-bit versions of the Zoom Client for Meetings before 5.12.6 and Zoom Rooms for Conference Room before version 5.12.6 are susceptible to a DLL injection vulnerability. A local low-privileged user could exploit this vulnerability to run arbitrary code in the context of the Zoom client.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 3.3, baseSeverity: "LOW", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-94", description: "CWE-94: Improper Control of Generation of Code ('Code Injection')", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2022-11-17T00:00:00", orgId: "99b9af0d-a833-4a5d-9e2f-8b1324f35351", shortName: "Zoom", }, references: [ { url: "https://explore.zoom.us/en/trust/security/security-bulletin/", }, ], source: { discovery: "EXTERNAL", }, title: "DLL injection in Zoom Windows Clients", x_generator: { engine: "Vulnogram 0.0.9", }, }, }, cveMetadata: { assignerOrgId: "99b9af0d-a833-4a5d-9e2f-8b1324f35351", assignerShortName: "Zoom", cveId: "CVE-2022-28766", datePublished: "2022-11-17T22:36:56.734031Z", dateReserved: "2022-04-06T00:00:00", dateUpdated: "2024-09-16T22:31:26.358Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }