First published: Tue Feb 13 2024(Updated: )
Improper input validation in Zoom Desktop Client for Windows, Zoom VDI Client for Windows, and Zoom Meeting SDK for Windows may allow an authenticated user to conduct a disclosure of information via network access.
Credit: security@zoom.us
Affected Software | Affected Version | How to fix |
---|---|---|
Zoom Meeting SDK | <5.17.0 | |
Zoom Client for Meetings | <5.15.15 | |
Zoom Client for Meetings | >5.15.15<5.16.12 | |
Zoom Client for Meetings | >5.16.12<5.17.0 | |
Zoom | <5.17.0 | |
Zoom Desktop Client | =before version 5.16.5 | |
Zoom Client for Meetings | =before version 5.16.10 (excluding 5.14.14 and 5.15.12) | |
Zoom Rooms | =before version 5.17.0 | |
Zoom Zoom Meeting SDK | =before version 5.16.5 | |
Zoom Desktop Client | ||
Zoom Zoom mobile apps | ||
Zoom Client for Meetings | ||
Zoom Rooms | ||
Zoom Zoom Meeting SDK |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2024-24696 is classified as a medium-severity vulnerability involving improper input validation.
To remediate CVE-2024-24696, update to the latest version of the affected Zoom software, ensuring it is beyond the specified vulnerable versions.
CVE-2024-24696 affects the Zoom Desktop Client, Zoom VDI Client, and Zoom Meeting SDK for Windows, particularly versions below the specified thresholds.
Yes, CVE-2024-24696 may allow an authenticated user to disclose sensitive information via network access due to improper input validation.
CVE-2024-24696 was reported in early 2024, highlighting security concerns in the Zoom software.