First published: Thu Aug 11 2022(Updated: )
The Zoom Client for Meetings (for Android, iOS, Linux, macOS, and Windows) before version 5.11.0 are susceptible to a URL parsing vulnerability. If a malicious Zoom meeting URL is opened, the malicious link may direct the user to connect to an arbitrary network address, leading to additional attacks including the potential for remote code execution through launching executables from arbitrary paths.
Credit: security@zoom.us
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Virtual Desktop Infrastructure | <5.10.7 | |
Zoom | <5.11.0 | |
Zoom | <5.11.0 | |
Zoom Zoom Linux kernel | <5.11.0 | |
Zoom | <5.11.0 | |
Zoom | <5.11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-28755 has been assigned a severity classification that indicates it poses a risk to users of vulnerable Zoom clients.
To fix CVE-2022-28755, users should update their Zoom Client to version 5.11.0 or later.
CVE-2022-28755 affects the Zoom Client on Android, iOS, Linux, macOS, and Windows before version 5.11.0.
CVE-2022-28755 is a URL parsing vulnerability that can lead to users connecting to arbitrary network addresses.
No, older versions of Zoom prior to 5.11.0 are not safe to use due to the risk posed by CVE-2022-28755.