CVE-2021-34417 vulnerability in Zoom Products
Published on November 11, 2021
Authenticated remote command execution with root privileges via web console in MMR
The network proxy page on the web portal for the Zoom On-Premise Meeting Connector Controller before version 4.6.365.20210703, Zoom On-Premise Meeting Connector MMR before version 4.6.365.20210703, Zoom On-Premise Recording Connector before version 3.8.45.20210703, Zoom On-Premise Virtual Room Connector before version 4.4.6868.20210703, and Zoom On-Premise Virtual Room Connector Load Balancer before version 2.5.5496.20210703 fails to validate input sent in requests to set the network proxy password. This could lead to remote command injection by a web portal administrator.
Vulnerability Analysis
CVE-2021-34417 can be exploited with local system access, and requires user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have a high impact on confidentiality and integrity, and no impact on availability.
Products Associated with CVE-2021-34417
Want to know whenever a new CVE is published for Zoom products? stack.watch will email you.
Affected Versions
Zoom Video Communications Inc Zoom On-Premise Meeting Connector Controller:- Version unspecified and below 4.6.365.20210703 is affected.
- Version unspecified and below 4.6.365.20210703 is affected.
- Version unspecified and below 3.8.45.20210703 is affected.
- Version unspecified and below 4.4.6868.20210703 is affected.
- Version unspecified and below 2.5.5496.20210703 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.