First published: Wed Aug 14 2024(Updated: )
Sensitive information exposure in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow an authenticated user to conduct an information disclosure via network access.
Credit: security@zoom.us
Affected Software | Affected Version | How to fix |
---|---|---|
Zoom Meeting Software Development Kit | <6.0.12 | |
Zoom meeting software development kit iphone os | <6.0.12 | |
Zoom Rooms | <6.1.0 | |
Zoom Rooms | <6.1.0 | |
Zoom Rooms | <6.1.0 | |
Zoom Rooms Controller | <6.1.0 | |
Zoom Rooms Controller | <6.1.0 | |
Zoom Rooms Controller macos | <6.1.0 | |
Zoom Rooms Controller | <6.1.0 | |
Zoom Workplace | <6.0.12 | |
Zoom Workplace | <6.0.12 | |
Zoom Workplace | <6.0.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-39822 is classified as a vulnerability that allows sensitive information exposure.
To fix CVE-2024-39822, update the affected Zoom Workplace Apps, SDKs, Rooms Clients, or Rooms Controllers to the latest versions.
CVE-2024-39822 affects versions prior to 6.0.12 for Zoom Meeting SDK and prior to 6.1.0 for Zoom Rooms and Rooms Controllers.
No, CVE-2024-39822 requires an authenticated user to conduct information disclosure.
CVE-2024-39822 impacts the Zoom Meeting SDK, Zoom Rooms, Rooms Controllers, and Zoom Workplace Apps.