In the Zoom Client through 4.4.4 and RingCentral 7.0.136380.0312 on macOS, remote attackers can force a user to join a video call with the video camera active. This occurs because any web site can interact with the Zoom web server on localhost port 19421 or 19424. NOTE: a machine remains vulnerable if the Zoom Client was installed in the past and then uninstalled. Blocking exploitation requires additional steps, such as the ZDisableVideo preference and/or killing the web server, deleting the ~/.zoomus directory, and creating a ~/.zoomus plain file.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2019-07-09T05:49:07
Updated: 2024-08-04T23:49:25.076Z
Reserved: 2019-07-09T00:00:00
Link: CVE-2019-13450
Vulnrichment
No data.
NVD
Status : Modified
Published: 2019-07-09T06:15:10.820
Modified: 2024-11-21T04:24:55.590
Link: CVE-2019-13450
Redhat
No data.