First published: Wed Feb 14 2024(Updated: )
Improper input validation in Zoom Desktop Client for Windows, Zoom VDI Client for Windows, and Zoom Meeting SDK for Windows may allow an unauthenticated user to conduct an escalation of privilege via network access.
Credit: security@zoom.us
Affected Software | Affected Version | How to fix |
---|---|---|
Zoom Meeting SDK | <5.16.5 | |
Zoom Rooms | <5.17.0 | |
Zoom Client for Meetings | <5.14.14 | |
Zoom Client for Meetings | >5.14.14<5.15.12 | |
Zoom Client for Meetings | >5.15.12<5.16.10 | |
Zoom | <5.16.5 | |
Zoom Desktop Client | =before version 5.16.5 | |
Zoom Client for Meetings | =before version 5.16.10 (excluding 5.14.14 and 5.15.12) | |
Zoom Rooms | =before version 5.17.0 | |
Zoom Zoom Meeting SDK | =before version 5.16.5 | |
Zoom Desktop Client | ||
Zoom Zoom mobile apps | ||
Zoom Client for Meetings | ||
Zoom Rooms | ||
Zoom Zoom Meeting SDK |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2024-24691 is considered a critical vulnerability due to its potential for privilege escalation by unauthenticated users.
To fix CVE-2024-24691, it is essential to update the affected Zoom products to the latest versions that are not vulnerable.
CVE-2024-24691 affects Zoom Desktop Client versions before 5.16.5, Zoom VDI Client before 5.16.10, and Zoom Rooms before 5.17.0.
Yes, CVE-2024-24691 can be exploited remotely via network access by an unauthenticated user.
Users of the affected Zoom software on Windows platforms are at risk of exploitation due to CVE-2024-24691.