Zoom Zoom

stack.watch can notify you when security vulnerabilities are reported in any Zoom product. You can add multiple products that you use with Zoom to create your own personal software stack watcher.

Products by Zoom Sorted by Most Security Vulnerabilities since 2018

Zoom Meetings5 vulnerabilities

Zoom4 vulnerabilities

Zoom It Installer1 vulnerability

By the Year

In 2020 there have been 6 vulnerabilities in Zoom with an average score of 7.0 out of ten. Last year Zoom had 3 security vulnerabilities published. That is, 3 more vulnerabilities have already been reported in 2020 as compared to last year. Last year, the average CVE base score was greater by 0.32

Year Vulnerabilities Average Score
2020 6 6.95
2019 3 7.27
2018 1 9.80

It may take a day or so for new Zoom vulnerabilities to show up. Additionally vulnerabilities may be tagged under a different product or component name.

Latest Zoom Security Vulnerabilities

The Zoom IT installer for Windows (ZoomInstallerFull.msi) prior to version 4.6.10 deletes files located in %APPDATA%\Zoom before installing an updated version of the client

CVE-2020-11443 8.1 - High - May 04, 2020

The Zoom IT installer for Windows (ZoomInstallerFull.msi) prior to version 4.6.10 deletes files located in %APPDATA%\Zoom before installing an updated version of the client. Standard users are able to write to this directory, and can write links to other directories on the machine. As the installer runs with SYSTEM privileges and follows these links, a user can cause the installer to delete files that otherwise cannot be deleted by the user.

Incorrect Permission Assignment for Critical Resource

** DISPUTED ** airhost.exe in Zoom Client for Meetings 4.6.11 uses the SHA-256 hash of 0123425234234fsdfsdr3242 for initialization of an OpenSSL EVP AES-256 CBC context

CVE-2020-11876 7.5 - High - April 17, 2020

** DISPUTED ** airhost.exe in Zoom Client for Meetings 4.6.11 uses the SHA-256 hash of 0123425234234fsdfsdr3242 for initialization of an OpenSSL EVP AES-256 CBC context. NOTE: the vendor states that this initialization only occurs within unreachable code.

Use of Hard-coded Credentials

** DISPUTED ** airhost.exe in Zoom Client for Meetings 4.6.11 uses 3423423432325249 as the Initialization Vector (IV) for AES-256 CBC encryption

CVE-2020-11877 7.5 - High - April 17, 2020

** DISPUTED ** airhost.exe in Zoom Client for Meetings 4.6.11 uses 3423423432325249 as the Initialization Vector (IV) for AES-256 CBC encryption. NOTE: the vendor states that this IV is used only within unreachable code.

Inadequate Encryption Strength

Zoom Client for Meetings through 4.6.9 uses the ECB mode of AES for video and audio encryption

CVE-2020-11500 7.5 - High - April 03, 2020

Zoom Client for Meetings through 4.6.9 uses the ECB mode of AES for video and audio encryption. Within a meeting, all participants use a single 128-bit key.

Use of a Broken or Risky Cryptographic Algorithm

Zoom Client for Meetings through 4.6.8 on macOS copies runwithroot to a user-writable temporary directory during installation, which

CVE-2020-11469 7.8 - High - April 01, 2020

Zoom Client for Meetings through 4.6.8 on macOS copies runwithroot to a user-writable temporary directory during installation, which allows a local process (with the user's privileges) to obtain root access by replacing runwithroot.

Improper Privilege Management

Zoom Client for Meetings through 4.6.8 on macOS has the disable-library-validation entitlement, which

CVE-2020-11470 3.3 - Low - April 01, 2020

Zoom Client for Meetings through 4.6.8 on macOS has the disable-library-validation entitlement, which allows a local process (with the user's privileges) to obtain unprompted microphone and camera access by loading a crafted library and thereby inheriting Zoom Client's microphone and camera access.

AuthZ

The Zoom Client before 4.4.53932.0709 on macOS allows remote code execution, a different vulnerability than CVE-2019-13450

CVE-2019-13567 8.8 - High - July 12, 2019

The Zoom Client before 4.4.53932.0709 on macOS allows remote code execution, a different vulnerability than CVE-2019-13450. If the ZoomOpener daemon (aka the hidden web server) is running, but the Zoom Client is not installed or can't be opened, an attacker can remotely execute code with a maliciously crafted launch URL. NOTE: ZoomOpener is removed by the Apple Malware Removal Tool (MRT) if this tool is enabled and has the 2019-07-10 MRTConfigData.

Improper Input Validation

In the Zoom Client before 4.4.2 on macOS, remote attackers can cause a denial of service (continual focus grabs)

CVE-2019-13449 6.5 - Medium - July 09, 2019

In the Zoom Client before 4.4.2 on macOS, remote attackers can cause a denial of service (continual focus grabs) via a sequence of invalid launch?action=join&confno= requests to localhost port 19421.

Improper Input Validation

In the Zoom Client through 4.4.4 and RingCentral 7.0.136380.0312 on macOS, remote attackers

CVE-2019-13450 6.5 - Medium - July 09, 2019

In the Zoom Client through 4.4.4 and RingCentral 7.0.136380.0312 on macOS, remote attackers can force a user to join a video call with the video camera active. This occurs because any web site can interact with the Zoom web server on localhost port 19421 or 19424. NOTE: a machine remains vulnerable if the Zoom Client was installed in the past and then uninstalled. Blocking exploitation requires additional steps, such as the ZDisableVideo preference and/or killing the web server, deleting the ~/.zoomus directory, and creating a ~/.zoomus plain file.

Authorization

Zoom clients on Windows (before version 4.1.34814.1119)

CVE-2018-15715 9.8 - Critical - November 30, 2018

Zoom clients on Windows (before version 4.1.34814.1119), Mac OS (before version 4.1.34801.1116), and Linux (2.4.129780.0915 and below) are vulnerable to unauthorized message processing. A remote unauthenticated attacker can spoof UDP messages from a meeting attendee or Zoom server in order to invoke functionality in the target client. This allows the attacker to remove attendees from meetings, spoof messages from users, or hijack shared screens.

Improper Input Validation

Built by Foundeo Inc., with data from the National Vulnerability Database (NVD), Icons by Icons8