First published: Tue Jul 09 2019(Updated: )
In the Zoom Client through 4.4.4 and RingCentral 7.0.136380.0312 on macOS, remote attackers can force a user to join a video call with the video camera active. This occurs because any web site can interact with the Zoom web server on localhost port 19421 or 19424. NOTE: a machine remains vulnerable if the Zoom Client was installed in the past and then uninstalled. Blocking exploitation requires additional steps, such as the ZDisableVideo preference and/or killing the web server, deleting the ~/.zoomus directory, and creating a ~/.zoomus plain file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ringcentral Ringcentral | =7.0.136380.0312 | |
Zoom Zoom | <=4.4.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-13450 is a vulnerability in the Zoom Client and RingCentral on macOS that allows remote attackers to force a user to join a video call with the video camera active.
This vulnerability occurs because any website can interact with the Zoom web server on localhost port 19421 or 19424.
The Zoom Client up to version 4.4.4 and RingCentral version 7.0.136380.0312 on macOS are affected.
The severity of CVE-2019-13450 is medium, with a CVSS score of 6.5.
To mitigate CVE-2019-13450, update to the latest version of the Zoom Client and RingCentral software.