First published: Mon Oct 24 2022(Updated: )
The Zoom Client for Meetings (for Android, iOS, Linux, macOS, and Windows) before version 5.12.2 is susceptible to a URL parsing vulnerability. If a malicious Zoom meeting URL is opened, the malicious link may direct the user to connect to an arbitrary network address, leading to additional attacks including session takeovers.
Credit: security@zoom.us
Affected Software | Affected Version | How to fix |
---|---|---|
Zoom Meetings | <5.12.2 | |
Zoom Meetings | <5.12.2 | |
Zoom Meetings | <5.12.2 | |
Zoom Meetings | <5.12.2 | |
Zoom Meetings | <5.12.2 | |
Zoom Rooms For Conference Rooms | <5.12.2 | |
Zoom Rooms For Conference Rooms | <5.12.2 | |
Zoom Rooms For Conference Rooms | <5.12.2 | |
Zoom Rooms For Conference Rooms | <5.12.2 | |
Zoom Rooms For Conference Rooms | <5.12.2 | |
Zoom Virtual Desktop Infrastructure | <5.12.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Zoom vulnerability is CVE-2022-28763.
The severity of CVE-2022-28763 is critical, with a severity value of 9.6.
The Zoom Client for Meetings (for Android, iOS, Linux, macOS, and Windows) before version 5.12.2, as well as Zoom Rooms for Conference Rooms and Zoom Virtual Desktop Infrastructure, are affected by CVE-2022-28763.
CVE-2022-28763 allows a malicious Zoom meeting URL to direct users to connect to an arbitrary network address, leading to additional attacks.
Yes, the fix for CVE-2022-28763 is to update Zoom Client for Meetings (for Android, iOS, Linux, macOS, and Windows) to version 5.12.2 or later.