Description
Zoom Client for Meetings for macOS (Standard and for IT Admin) starting with 5.10.6 and prior to 5.12.0 contains a debugging port misconfiguration. When camera mode rendering context is enabled as part of the Zoom App Layers API by running certain Zoom Apps, a local debugging port is opened by the Zoom client. A local malicious user could use this debugging port to connect to and control the Zoom Apps running in the Zoom client.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-33201 | Zoom Client for Meetings for macOS (Standard and for IT Admin) starting with 5.10.6 and prior to 5.12.0 contains a debugging port misconfiguration. When camera mode rendering context is enabled as part of the Zoom App Layers API by running certain Zoom Apps, a local debugging port is opened by the Zoom client. A local malicious user could use this debugging port to connect to and control the Zoom Apps running in the Zoom client. |
References
| Link | Providers |
|---|---|
| https://explore.zoom.us/en/trust/security/security-bulletin/ |
|
History
Wed, 14 May 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Zoom
Published:
Updated: 2025-05-14T15:10:48.155Z
Reserved: 2022-04-06T00:00:00.000Z
Link: CVE-2022-28762
Updated: 2024-08-03T06:03:52.685Z
Status : Modified
Published: 2022-10-14T15:15:17.117
Modified: 2024-11-21T06:57:53.183
Link: CVE-2022-28762
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD