The Zoom Client for Meetings (for Android, iOS, Linux, MacOS, and Windows) before version 5.10.0 failed to properly constrain client session cookies to Zoom domains. This issue could be used in a more sophisticated attack to send an unsuspecting users Zoom-scoped session cookies to a non-Zoom domain. This could potentially allow for spoofing of a Zoom user.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2022-27928 | The Zoom Client for Meetings (for Android, iOS, Linux, MacOS, and Windows) before version 5.10.0 failed to properly constrain client session cookies to Zoom domains. This issue could be used in a more sophisticated attack to send an unsuspecting users Zoom-scoped session cookies to a non-Zoom domain. This could potentially allow for spoofing of a Zoom user. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
Link | Providers |
---|---|
https://explore.zoom.us/en/trust/security/security-bulletin |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: Zoom
Published:
Updated: 2024-09-17T02:41:15.335Z
Reserved: 2022-01-07T00:00:00
Link: CVE-2022-22785

No data.

Status : Modified
Published: 2022-05-18T16:15:08.697
Modified: 2024-11-21T06:47:26.770
Link: CVE-2022-22785

No data.

No data.