Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2022-28759 : Exploit Details and Defense Strategies

Zoom On-Premise Meeting Connector MMR before version 4.8.20220815.130 has an improper access control vulnerability allowing unauthorized access to meeting audio and video feeds. Learn how to mitigate it.

Zoom On-Premise Meeting Connector MMR before version 4.8.20220815.130 contains an improper access control vulnerability that could allow a malicious actor to access unauthorized meeting audio and video feeds and disrupt meetings.

Understanding CVE-2022-28759

This CVE identifies an improper access control vulnerability in Zoom's On-Premise Meeting Connector MMR software.

What is CVE-2022-28759?

The vulnerability in Zoom On-Premise Meeting Connector MMR allows unauthorized access to meeting audio and video feeds, potentially leading to disruptions by malicious actors.

The Impact of CVE-2022-28759

If exploited, the vulnerability could compromise meeting privacy and integrity, allowing unauthorized individuals to view and disrupt meetings they are not supposed to be in.

Technical Details of CVE-2022-28759

The vulnerability is categorized as CWE-284 Improper Access Control with a CVSSv3.1 base score of 8.2 (High).

Vulnerability Description

The improper access control vulnerability in Zoom's On-Premise Meeting Connector MMR software allows attackers to access unauthorized meeting audio and video feeds.

Affected Systems and Versions

Zoom On-Premise Meeting Connector MMR versions earlier than 4.8.20220815.130 are affected by this vulnerability.

Exploitation Mechanism

Attackers exploit this vulnerability to gain access to meeting audio and video feeds of meetings they are not authorized to join.

Mitigation and Prevention

To address CVE-2022-28759, immediate action and long-term security practices are crucial.

Immediate Steps to Take

Users should update Zoom On-Premise Meeting Connector MMR to version 4.8.20220815.130 or newer to mitigate the vulnerability.

Long-Term Security Practices

Enforce strict access controls and regularly update software to prevent future vulnerabilities.

Patching and Updates

Stay informed about security bulletins and apply patches promptly to protect against known vulnerabilities.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now