First published: Fri Oct 14 2022(Updated: )
Zoom Client for Meetings for macOS (Standard and for IT Admin) starting with 5.10.6 and prior to 5.12.0 contains a debugging port misconfiguration. When camera mode rendering context is enabled as part of the Zoom App Layers API by running certain Zoom Apps, a local debugging port is opened by the Zoom client. A local malicious user could use this debugging port to connect to and control the Zoom Apps running in the Zoom client.
Credit: security@zoom.us
Affected Software | Affected Version | How to fix |
---|---|---|
Zoom Meetings | >=5.10.6<5.12.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Zoom macOS vulnerability is CVE-2022-28762.
The severity of CVE-2022-28762 is high with a severity value of 7.8.
Zoom Client for Meetings for macOS versions starting from 5.10.6 and prior to 5.12.0 are affected by CVE-2022-28762.
The issue in Zoom Client for Meetings for macOS that leads to CVE-2022-28762 is a debugging port misconfiguration.
To fix CVE-2022-28762, update Zoom Client for Meetings for macOS to version 5.12.0 or later.