First published: Wed Feb 14 2024(Updated: )
Improper input validation in some Zoom clients may allow an authenticated user to conduct a denial of service via network access.
Credit: security@zoom.us
Affected Software | Affected Version | How to fix |
---|---|---|
Zoom Desktop Client | =before version 5.16.5 | |
Zoom Client for Meetings | =before version 5.16.10 (excluding 5.14.14 and 5.15.12) | |
Zoom Rooms | =before version 5.17.0 | |
Zoom Zoom Meeting SDK | =before version 5.16.5 | |
Zoom Desktop Client | ||
Zoom Zoom mobile apps | ||
Zoom Client for Meetings | ||
Zoom Rooms | ||
Zoom Zoom Meeting SDK | ||
Zoom Meeting SDK | <5.16.5 | |
Zoom Rooms | <5.17.0 | |
Zoom Client for Meetings | <5.14.14 | |
Zoom Client for Meetings | >5.14.14<5.15.12 | |
Zoom Client for Meetings | >5.15.12<5.16.10 | |
Zoom Video Software Development Kit | <5.16.5 | |
Zoom | <5.16.5 | |
Zoom | <5.16.5 | |
Zoom Zoom Linux kernel | <5.16.5 | |
Zoom | <5.16.5 | |
Zoom | <5.16.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The severity of CVE-2024-24690 is classified based on its impact on system availability due to improper input validation leading to potential denial of service.
To fix CVE-2024-24690, upgrade your Zoom clients to versions 5.16.5 or later for desktop, 5.16.10 or later for VDI clients, and 5.17.0 or later for Zoom Rooms.
CVE-2024-24690 affects Zoom Desktop Client, Zoom VDI Client, Zoom Rooms Client, and Zoom Meeting SDK before their respective versions specified in the vulnerability description.
The potential consequences of CVE-2024-24690 include an authenticated user being able to disrupt the service for other users via network access.
There are no official workarounds for CVE-2024-24690, and the recommended action is to upgrade to the latest versions of the affected Zoom products.