zoom zoom-on-premise-meeting-connector-controller CVE-2021-34417 vulnerability in Zoom Products
Published on November 11, 2021

Authenticated remote command execution with root privileges via web console in MMR
The network proxy page on the web portal for the Zoom On-Premise Meeting Connector Controller before version 4.6.365.20210703, Zoom On-Premise Meeting Connector MMR before version 4.6.365.20210703, Zoom On-Premise Recording Connector before version 3.8.45.20210703, Zoom On-Premise Virtual Room Connector before version 4.4.6868.20210703, and Zoom On-Premise Virtual Room Connector Load Balancer before version 2.5.5496.20210703 fails to validate input sent in requests to set the network proxy password. This could lead to remote command injection by a web portal administrator.

NVD

Vulnerability Analysis

CVE-2021-34417 can be exploited with local system access, and requires user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have a high impact on confidentiality and integrity, and no impact on availability.

Attack Vector:
LOCAL
Attack Complexity:
LOW
Privileges Required:
HIGH
User Interaction:
NONE
Scope:
CHANGED
Confidentiality Impact:
HIGH
Integrity Impact:
HIGH
Availability Impact:
NONE

Products Associated with CVE-2021-34417

Want to know whenever a new CVE is published for Zoom products? stack.watch will email you.

 
 
 
 
 

Affected Versions

Zoom Video Communications Inc Zoom On-Premise Meeting Connector Controller: Zoom Video Communications Inc Zoom On-Premise Meeting Connector MMR: Zoom Video Communications Inc Zoom On-Premise Recording Connector: Zoom Video Communications Inc Zoom On-Premise Virtual Room Connector: Zoom Video Communications Inc Zoom On-Premise Virtual Room Connector Load Balancer:

Exploit Probability

EPSS
0.36%
Percentile
57.93%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.