Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2022-28750 : What You Need to Know

Zoom On-Premise Meeting Connector Zone Controller (ZC) before version 4.8.20220419.112 is vulnerable to a stack buffer overflow CVE-2022-28750. Learn about the impact, technical details, and mitigation steps.

Zoom On-Premise Deployments: Stack Buffer Overflow in Meeting Connector

Understanding CVE-2022-28750

This CVE describes a vulnerability in the Zoom On-Premise Meeting Connector Zone Controller (ZC) that could allow a malicious actor to crash the application or execute arbitrary code.

What is CVE-2022-28750?

The issue arises from the failure of the system to properly parse STUN error codes, leading to memory corruption. Systems running versions older than 4.8.12.20211115 are particularly at risk.

The Impact of CVE-2022-28750

The vulnerability poses a high risk to affected systems, with a CVSS base score of 7.5. If exploited, it could result in a denial of service or unauthorized code execution.

Technical Details of CVE-2022-28750

Vulnerability Description

The vulnerability in Zoom On-Premise Meeting Connector Zone Controller (ZC) stems from inadequate handling of STUN error codes, potentially resulting in memory corruption.

Affected Systems and Versions

Zoom On-Premise Meeting Connector Zone Controller (ZC) versions before 4.8.20220419.112 are vulnerable. Specifically, versions older than 4.8.12.20211115 are at higher risk.

Exploitation Mechanism

The vulnerability can be exploited by sending specially crafted network packets containing malicious STUN error codes, triggering memory corruption and potential system crashes or code execution.

Mitigation and Prevention

Immediate Steps to Take

Zoom users are advised to update their systems to version 4.8.20220419.112 or newer to mitigate the risk of exploitation. Additionally, monitoring network traffic for any suspicious activity can help detect potential attacks.

Long-Term Security Practices

Regularly updating Zoom On-Premise Meeting Connector software and maintaining awareness of security bulletins and patches from Zoom is crucial for preventing future vulnerabilities.

Patching and Updates

Zoom has released patches addressing the vulnerability. It is vital for organizations to apply these patches promptly to secure their systems against potential threats.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now