CVE Published: 27/09/2021 |
CVE Updated: 16/09/2024 |
CVE Year: 2021 Source: Zoom |
Vendor: Zoom Video Communications Inc |
Product: Zoom Client for Meetings for MacOS (Standard and for IT Admin) Status : PUBLISHED
CVE-2021-34409 Description
It was discovered that the installation packages of the Zoom Client for Meetings for MacOS (Standard and for IT Admin) installation before version 5.2.0, Zoom Client Plugin for Sharing iPhone/iPad before version 5.2.0, and Zoom Rooms for Conference before version 5.1.0, copy pre- and post- installation shell scripts to a user-writable directory. In the affected products listed below, a malicious actor with local access to a user\'s machine could use this flaw to potentially run arbitrary system commands in a higher privileged context during the installation process.
Metrics
CVSS Version: 3.1 |
Base Score: 7.8 HIGH Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
l➤ Exploitability Metrics: Attack Vector (AV)* LOCAL Attack Complexity (AC)* HIGH Privileges Required (PR)* LOW User Interaction (UI)* NONE Scope (S)* CHANGED
l➤ Impact Metrics: Confidentiality Impact (C)* HIGH Integrity Impact (I)* HIGH Availability Impact (A)* HIGH
Weakness Enumeration (CWE)
CWE-ID: CWE Name: Creation of Temporary File in Directory with Insecure Permissions Source: Zoom Video Communications Inc
Common Attack Pattern Enumeration and Classification (CAPEC)