First published: Tue Feb 13 2024(Updated: )
Untrusted search path in some Zoom 32 bit Windows clients may allow an authenticated user to conduct an escalation of privilege via local access.
Credit: security@zoom.us
Affected Software | Affected Version | How to fix |
---|---|---|
Zoom Meeting SDK | <5.17.0 | |
Zoom Rooms | <5.17.0 | |
Zoom Client for Meetings | <5.15.5 | |
Zoom Client for Meetings | >5.15.5<5.16.2 | |
Zoom Client for Meetings | >5.16.2<5.17.5 | |
Zoom | <5.17.0 | |
Zoom Desktop Client | =before version 5.16.5 | |
Zoom Client for Meetings | =before version 5.16.10 (excluding 5.14.14 and 5.15.12) | |
Zoom Rooms | =before version 5.17.0 | |
Zoom Zoom Meeting SDK | =before version 5.16.5 | |
Zoom Desktop Client | ||
Zoom Zoom mobile apps | ||
Zoom Client for Meetings | ||
Zoom Rooms | ||
Zoom Zoom Meeting SDK |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2024-24697 has been classified as a moderate severity vulnerability due to its potential for privilege escalation.
To remediate CVE-2024-24697, update your Zoom client to the latest version beyond 5.17.0 for relevant products.
CVE-2024-24697 affects various Zoom products, including Zoom Desktop Client, Zoom Client for Meetings, and Zoom Meeting SDK for versions below specified thresholds.
No, CVE-2024-24697 requires an authenticated user to exploit the vulnerability.
CVE-2024-24697 involves an untrusted search path that may allow local access to escalate privileges.