First published: Tue Feb 25 2025(Updated: )
Buffer overflow in some Zoom Apps may allow an authenticated user to conduct an escalation of privilege via network access.
Credit: security@zoom.us
Affected Software | Affected Version | How to fix |
---|---|---|
Zoom Zoom Apps for macOS | ||
<6.2.0 | ||
<6.2.0 | ||
<6.2.0 | ||
<6.2.0 | ||
<6.2.0 | ||
<6.2.0 | ||
<6.2.0 | ||
<6.2.0 | ||
<6.2.0 | ||
<6.2.0 | ||
<6.2.0 | ||
<6.2.0 | ||
<6.2.0 | ||
<6.2.0 | ||
<6.2.0 | ||
<6.2.0 | ||
<6.2.0 | ||
<6.2.0 | ||
<6.2.0 | ||
<6.2.0 | ||
<6.2.0 | ||
<6.2.0 | ||
<6.1.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-45421 is classified as a high severity vulnerability due to its potential for privilege escalation.
To fix CVE-2024-45421, install the latest updates for the affected Zoom Apps and development kits.
Users of Zoom Apps, Zoom Meeting SDK, and Zoom Rooms versions prior to 6.2.0 are affected by CVE-2024-45421.
Yes, CVE-2024-45421 can be exploited via network access, allowing authenticated users to escalate privileges.
Exploitation of CVE-2024-45421 may lead to unauthorized access and privilege escalation for authenticated users.