It was discovered that the installation packages of the Zoom Client for Meetings for MacOS (Standard and for IT Admin) installation before version 5.2.0, Zoom Client Plugin for Sharing iPhone/iPad before version 5.2.0, and Zoom Rooms for Conference before version 5.1.0, copy pre- and post- installation shell scripts to a user-writable directory. In the affected products listed below, a malicious actor with local access to a user's machine could use this flaw to potentially run arbitrary system commands in a higher privileged context during the installation process.
Advisories
Source ID Title
EUVD EUVD EUVD-2021-21067 It was discovered that the installation packages of the Zoom Client for Meetings for MacOS (Standard and for IT Admin) installation before version 5.2.0, Zoom Client Plugin for Sharing iPhone/iPad before version 5.2.0, and Zoom Rooms for Conference before version 5.1.0, copy pre- and post- installation shell scripts to a user-writable directory. In the affected products listed below, a malicious actor with local access to a user's machine could use this flaw to potentially run arbitrary system commands in a higher privileged context during the installation process.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: Zoom

Published:

Updated: 2024-09-16T23:46:09.631Z

Reserved: 2021-06-09T00:00:00

Link: CVE-2021-34409

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-09-27T14:15:08.137

Modified: 2024-11-21T06:10:20.527

Link: CVE-2021-34409

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.