Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2022-28763 : Security Advisory and Response

Zoom Client for Meetings versions prior to 5.12.2 are vulnerable to improper URL parsing flaw, allowing attackers to redirect users to unauthorized network addresses.

Zoom Client for Meetings URL Parsing Vulnerability

Understanding CVE-2022-28763

This CVE involves an improper URL parsing vulnerability in the Zoom Client for Meetings, affecting various platforms like Android, iOS, Linux, macOS, and Windows.

What is CVE-2022-28763?

The Zoom Client for Meetings versions prior to 5.12.2 are vulnerable to a URL parsing flaw. Opening a malicious Zoom meeting URL can lead users to connect to an arbitrary network address, potentially resulting in further attacks like session takeovers.

The Impact of CVE-2022-28763

The vulnerability poses a high risk, with a CVSS base score of 8.8 (High). Attackers can exploit this flaw to execute attacks with high confidentiality, integrity, and availability impact.

Technical Details of CVE-2022-28763

Vulnerability Description

The vulnerability arises due to improper URL parsing in the Zoom Client for Meetings, allowing malicious Zoom meeting URLs to redirect users to unauthorized network addresses.

Affected Systems and Versions

        Vendor: Zoom Video Communications Inc
              Zoom Client for Meetings (for Android, iOS, Linux, macOS, and Windows) version less than 5.12.2
              Zoom VDI Windows Meeting Clients version less than 5.12.2
              Zoom Rooms for Conference Room (for Android, iOS, Linux, macOS, and Windows) version less than 5.12.2

Exploitation Mechanism

Attackers can create and distribute malicious Zoom meeting URLs, tricking users into accessing unauthorized network locations, facilitating potential session takeovers.

Mitigation and Prevention

Immediate Steps to Take

Users are advised to update their Zoom Client for Meetings to version 5.12.2 or later to mitigate the vulnerability. It is essential to exercise caution when clicking on Zoom meeting URLs to prevent exposure to potential attacks.

Long-Term Security Practices

Maintain awareness of security bulletins and updates from Zoom to stay informed about potential vulnerabilities and recommended security practices. Regularly educate users about the risks associated with clicking on unknown or suspicious URLs.

Patching and Updates

Zoom has released version 5.12.2, addressing the URL parsing vulnerability. Users should promptly update their Zoom Clients for Meetings to the latest version to safeguard their systems.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now