First published: Fri Nov 30 2018(Updated: )
Zoom clients on Windows (before version 4.1.34814.1119), Mac OS (before version 4.1.34801.1116), and Linux (2.4.129780.0915 and below) are vulnerable to unauthorized message processing. A remote unauthenticated attacker can spoof UDP messages from a meeting attendee or Zoom server in order to invoke functionality in the target client. This allows the attacker to remove attendees from meetings, spoof messages from users, or hijack shared screens.
Credit: vulnreport@tenable.com
Affected Software | Affected Version | How to fix |
---|---|---|
Zoom Zoom | <=2.4.129780.0915 | |
Zoom Zoom | <4.1.34801.1116 | |
Zoom Zoom | <4.1.34814.1119 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-15715 is a vulnerability found in Zoom clients on Windows, Mac OS, and Linux that allows a remote attacker to spoof UDP messages from a meeting attendee or Zoom server.
Zoom clients on Windows before version 4.1.34814.1119, Mac OS before version 4.1.34801.1116, and Linux 2.4.129780.0915 and below are affected by CVE-2018-15715.
CVE-2018-15715 has a severity rating of 9.8 (Critical).
To fix CVE-2018-15715, users should update their Zoom client to the latest version available for their operating system.
More information about CVE-2018-15715 can be found at the following link: https://www.tenable.com/security/research/tra-2018-40