First published: Tue Feb 13 2024(Updated: )
Improper authentication in some Zoom clients may allow a privileged user to conduct a disclosure of information via local access.
Credit: security@zoom.us
Affected Software | Affected Version | How to fix |
---|---|---|
Zoom Meeting SDK | <5.17.0 | |
Zoom Rooms | <5.17.0 | |
Zoom Client for Meetings | <5.15.5 | |
Zoom Client for Meetings | >5.15.15<5.16.12 | |
Zoom Client for Meetings | >5.16.12<5.17.5 | |
Zoom | <5.17.0 | |
Zoom | <5.17.0 | |
Zoom Zoom Linux kernel | <5.17.0 | |
Zoom | <5.17.0 | |
Zoom | <5.17.0 | |
Zoom Desktop Client | =before version 5.16.5 | |
Zoom Client for Meetings | =before version 5.16.10 (excluding 5.14.14 and 5.15.12) | |
Zoom Rooms | =before version 5.17.0 | |
Zoom Zoom Meeting SDK | =before version 5.16.5 | |
Zoom Desktop Client | ||
Zoom Zoom mobile apps | ||
Zoom Client for Meetings | ||
Zoom Rooms | ||
Zoom Zoom Meeting SDK |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2024-24698 has been assigned a medium severity rating due to its potential for improper authentication allowing information disclosure.
To fix CVE-2024-24698, you should update your Zoom clients to the latest versions available, specifically beyond 5.17.0 for most products.
CVE-2024-24698 affects multiple Zoom products including Zoom Desktop Client, Zoom Rooms, and various versions of the Zoom Mobile Apps.
Yes, exploitation of CVE-2024-24698 requires local access to the vulnerable Zoom client.
CVE-2024-24698 is classified as an improper authentication vulnerability that could lead to unauthorized information disclosure.