CERT-In issued a security advisory for multiple vulnerabilities in the Zoom app that could let attackers access sensitive information, escalate privileges, or disrupt service.
Vulnerabilities exist in various Zoom products, including the Zoom Workplace App, Zoom Rooms Client, and Zoom Video SDK, across multiple operating systems: macOS, iOS, Windows, Linux, and Android.
Bangladesh Cyber Security Intelligence (BCSI) officially launch the National Vulnerability Disclosure Program (NVDP) to enhance the country's cybersecurity. This initiative...
Northwave Cyber Security has found a sophisticated backdoor, LITTLELAMB.WOOLTEA, targeting Palo Alto Networks firewalls. Northwave researcher claimed the backdoor was...
A newly discovered vulnerability called "G-Door" enables malicious actors to bypass Microsoft 365 security by exploiting unmanaged Google Docs accounts....
Mastercard has completed its acquisition of Recorded Future, an AI-based threat intelligence provider. Mastercard has acquired the company for $2.65...
CISA has released eight advisories on vulnerabilities in Industrial Control Systems (ICS). These vulnerabilities affect essential software and hardware in...
Many Zoom applications are affected by the these vulnerabilities notably those before version 6.2.0. Affected products include:
CIRT in address the vulnerability as Improper Input Validation (CVE-2024-45422), Buffer Overflow Vulnerability (CVE-2024-45421), Symlink Following (CVE-2024-45418), Uncontrolled Resource Consumption (CVE-2024-45420), Improper Input Validation and Information Disclosure (CVE-2024-45419), Uncontrolled Resource Consumption in macOS Installers (CVE-2024-45417.
The vulnerabilities in these products arise from issues like improper input validation, buffer overflows, symlink following, and uncontrolled resource consumption. These flaws can result in serious consequences, including unauthorized system access, privilege escalation, and denial of service (DoS) attacks.
Zoom has recognized the issues and released updates on their website to fix them. This emphasizes the need for regular software updates to ensure cybersecurity.