First published: Tue Dec 14 2021(Updated: )
The Zoom Client for Meetings before version 5.7.3 (for Android, iOS, Linux, macOS, and Windows) contain a server side request forgery vulnerability in the chat\'s "link preview" functionality. In versions prior to 5.7.3, if a user were to enable the chat\'s "link preview" feature, a malicious actor could trick the user into potentially sending arbitrary HTTP GET requests to URLs that the actor cannot reach directly.
Credit: security@zoom.us
Affected Software | Affected Version | How to fix |
---|---|---|
Zoom Meetings | <5.7.3 | |
Apple iPhone OS | ||
Apple macOS | ||
Google Android | ||
Linux Linux kernel | ||
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-34425 is a server side request forgery vulnerability in the chat's "link preview" functionality in Zoom Client for Meetings.
Zoom Client for Meetings versions before 5.7.3 are affected by CVE-2021-34425.
CVE-2021-34425 has a severity level of 6.1 (medium).
To fix CVE-2021-34425, update Zoom Client for Meetings to version 5.7.3 or later.
You can find more information about CVE-2021-34425 at the following link: [zoom.us](https://explore.zoom.us/en/trust/security/security-bulletin)