First published: Thu Dec 15 2022(Updated: )
BigBlueButton is an open source web conferencing system. Versions prior to 2.4.3, are subject to Insufficient Verification of Data Authenticity, resulting in Denial of Service. An attacker can make a Meteor call to `validateAuthToken` using a victim's userId, meetingId, and an invalid authToken. This forces the victim to leave the conference, because the resulting verification failure is also observed and handled by the victim's client. The attacker must be a participant in any meeting on the server. This issue is patched in version 2.4.3. There are no workarounds.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Bigbluebutton Bigbluebutton | <2.4.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-41960 is a vulnerability in the BigBlueButton web conferencing system that allows for Denial of Service attacks.
The severity of CVE-2022-41960 is medium, with a CVSS score of 4.3.
Versions prior to 2.4.3 of BigBlueButton are affected by CVE-2022-41960.
An attacker can exploit CVE-2022-41960 by making a Meteor call to validateAuthToken using a victim's userId, meetingId, and an invalid authToken.
Yes, the fix for CVE-2022-41960 is to update to version 2.4.3 or later of BigBlueButton.