Zoom On-Premise Meeting Connector MMR before version 4.8.20220815.130 has an improper access control vulnerability allowing unauthorized access to meeting audio and video feeds. Learn how to mitigate it.
Zoom On-Premise Meeting Connector MMR before version 4.8.20220815.130 contains an improper access control vulnerability that could allow a malicious actor to access unauthorized meeting audio and video feeds and disrupt meetings.
Understanding CVE-2022-28759
This CVE identifies an improper access control vulnerability in Zoom's On-Premise Meeting Connector MMR software.
What is CVE-2022-28759?
The vulnerability in Zoom On-Premise Meeting Connector MMR allows unauthorized access to meeting audio and video feeds, potentially leading to disruptions by malicious actors.
The Impact of CVE-2022-28759
If exploited, the vulnerability could compromise meeting privacy and integrity, allowing unauthorized individuals to view and disrupt meetings they are not supposed to be in.
Technical Details of CVE-2022-28759
The vulnerability is categorized as CWE-284 Improper Access Control with a CVSSv3.1 base score of 8.2 (High).
Vulnerability Description
The improper access control vulnerability in Zoom's On-Premise Meeting Connector MMR software allows attackers to access unauthorized meeting audio and video feeds.
Affected Systems and Versions
Zoom On-Premise Meeting Connector MMR versions earlier than 4.8.20220815.130 are affected by this vulnerability.
Exploitation Mechanism
Attackers exploit this vulnerability to gain access to meeting audio and video feeds of meetings they are not authorized to join.
Mitigation and Prevention
To address CVE-2022-28759, immediate action and long-term security practices are crucial.
Immediate Steps to Take
Users should update Zoom On-Premise Meeting Connector MMR to version 4.8.20220815.130 or newer to mitigate the vulnerability.
Long-Term Security Practices
Enforce strict access controls and regularly update software to prevent future vulnerabilities.
Patching and Updates
Stay informed about security bulletins and apply patches promptly to protect against known vulnerabilities.