Zoom On-Premise Meeting Connector Zone Controller (ZC) before version 4.8.20220419.112 is vulnerable to a stack buffer overflow CVE-2022-28750. Learn about the impact, technical details, and mitigation steps.
Zoom On-Premise Deployments: Stack Buffer Overflow in Meeting Connector
Understanding CVE-2022-28750
This CVE describes a vulnerability in the Zoom On-Premise Meeting Connector Zone Controller (ZC) that could allow a malicious actor to crash the application or execute arbitrary code.
What is CVE-2022-28750?
The issue arises from the failure of the system to properly parse STUN error codes, leading to memory corruption. Systems running versions older than 4.8.12.20211115 are particularly at risk.
The Impact of CVE-2022-28750
The vulnerability poses a high risk to affected systems, with a CVSS base score of 7.5. If exploited, it could result in a denial of service or unauthorized code execution.
Technical Details of CVE-2022-28750
Vulnerability Description
The vulnerability in Zoom On-Premise Meeting Connector Zone Controller (ZC) stems from inadequate handling of STUN error codes, potentially resulting in memory corruption.
Affected Systems and Versions
Zoom On-Premise Meeting Connector Zone Controller (ZC) versions before 4.8.20220419.112 are vulnerable. Specifically, versions older than 4.8.12.20211115 are at higher risk.
Exploitation Mechanism
The vulnerability can be exploited by sending specially crafted network packets containing malicious STUN error codes, triggering memory corruption and potential system crashes or code execution.
Mitigation and Prevention
Immediate Steps to Take
Zoom users are advised to update their systems to version 4.8.20220419.112 or newer to mitigate the risk of exploitation. Additionally, monitoring network traffic for any suspicious activity can help detect potential attacks.
Long-Term Security Practices
Regularly updating Zoom On-Premise Meeting Connector software and maintaining awareness of security bulletins and patches from Zoom is crucial for preventing future vulnerabilities.
Patching and Updates
Zoom has released patches addressing the vulnerability. It is vital for organizations to apply these patches promptly to secure their systems against potential threats.