The Zoom Client for Meetings (for Android, iOS, Linux, MacOS, and Windows) before version 5.10.0 failed to properly constrain client session cookies to Zoom domains. This issue could be used in a more sophisticated attack to send an unsuspecting users Zoom-scoped session cookies to a non-Zoom domain. This could potentially allow for spoofing of a Zoom user.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-27928 | The Zoom Client for Meetings (for Android, iOS, Linux, MacOS, and Windows) before version 5.10.0 failed to properly constrain client session cookies to Zoom domains. This issue could be used in a more sophisticated attack to send an unsuspecting users Zoom-scoped session cookies to a non-Zoom domain. This could potentially allow for spoofing of a Zoom user. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://explore.zoom.us/en/trust/security/security-bulletin |
|
History
No history.
Status: PUBLISHED
Assigner: Zoom
Published:
Updated: 2024-09-17T02:41:15.335Z
Reserved: 2022-01-07T00:00:00
Link: CVE-2022-22785
No data.
Status : Modified
Published: 2022-05-18T16:15:08.697
Modified: 2024-11-21T06:47:26.770
Link: CVE-2022-22785
No data.
OpenCVE Enrichment
No data.
EUVD