Search criteria
3 vulnerabilities found for ringcentral by ringcentral
VAR-201907-0716
Vulnerability from variot - Updated: 2024-11-23 22:06In the Zoom Client through 4.4.4 and RingCentral 7.0.136380.0312 on macOS, remote attackers can force a user to join a video call with the video camera active. This occurs because any web site can interact with the Zoom web server on localhost port 19421 or 19424. NOTE: a machine remains vulnerable if the Zoom Client was installed in the past and then uninstalled. Blocking exploitation requires additional steps, such as the ZDisableVideo preference and/or killing the web server, deleting the ~/.zoomus directory, and creating a ~/.zoomus plain file. Zoom Client and RingCentral Contains an access control vulnerability.Information may be obtained. ZoomClient is a video conferencing terminal that supports multiple platforms from Zoom Company of the United States. There is an information disclosure vulnerability in ZoomClient. An attacker can leverage this issue to bypass security restrictions and perform unauthorized actions. This may aid in further attacks
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201907-0716",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "zoom",
"scope": "lte",
"trust": 1.0,
"vendor": "zoom",
"version": "4.4.4"
},
{
"model": "ringcentral",
"scope": "eq",
"trust": 1.0,
"vendor": "ringcentral",
"version": "7.0.136380.0312"
},
{
"model": "ringcentral",
"scope": "eq",
"trust": 0.8,
"vendor": "ringcentral",
"version": "7.0.136380.0312 (macos)"
},
{
"model": "client",
"scope": "lte",
"trust": 0.8,
"vendor": "zoom video",
"version": "4.4.4 (macos)"
},
{
"model": "client on macos",
"scope": "eq",
"trust": 0.6,
"vendor": "zoom",
"version": "4.4.4"
},
{
"model": "client",
"scope": "eq",
"trust": 0.3,
"vendor": "zoom",
"version": "4.4.4"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-21753"
},
{
"db": "BID",
"id": "109082"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-006352"
},
{
"db": "NVD",
"id": "CVE-2019-13450"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:ringcentral:ringcentral",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:zoom:zoom_client",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-006352"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Unknown",
"sources": [
{
"db": "BID",
"id": "109082"
},
{
"db": "CNNVD",
"id": "CNNVD-201907-383"
}
],
"trust": 0.9
},
"cve": "CVE-2019-13450",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2019-13450",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 7.8,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CNVD-2019-21753",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 2.8,
"id": "CVE-2019-13450",
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2019-13450",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2019-13450",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNVD",
"id": "CNVD-2019-21753",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201907-383",
"trust": 0.6,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-21753"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-006352"
},
{
"db": "CNNVD",
"id": "CNNVD-201907-383"
},
{
"db": "NVD",
"id": "CVE-2019-13450"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "In the Zoom Client through 4.4.4 and RingCentral 7.0.136380.0312 on macOS, remote attackers can force a user to join a video call with the video camera active. This occurs because any web site can interact with the Zoom web server on localhost port 19421 or 19424. NOTE: a machine remains vulnerable if the Zoom Client was installed in the past and then uninstalled. Blocking exploitation requires additional steps, such as the ZDisableVideo preference and/or killing the web server, deleting the ~/.zoomus directory, and creating a ~/.zoomus plain file. Zoom Client and RingCentral Contains an access control vulnerability.Information may be obtained. ZoomClient is a video conferencing terminal that supports multiple platforms from Zoom Company of the United States. There is an information disclosure vulnerability in ZoomClient. \nAn attacker can leverage this issue to bypass security restrictions and perform unauthorized actions. This may aid in further attacks",
"sources": [
{
"db": "NVD",
"id": "CVE-2019-13450"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-006352"
},
{
"db": "CNVD",
"id": "CNVD-2019-21753"
},
{
"db": "BID",
"id": "109082"
}
],
"trust": 2.43
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2019-13450",
"trust": 3.3
},
{
"db": "BID",
"id": "109082",
"trust": 1.9
},
{
"db": "JVNDB",
"id": "JVNDB-2019-006352",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2019-21753",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-201907-383",
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-21753"
},
{
"db": "BID",
"id": "109082"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-006352"
},
{
"db": "CNNVD",
"id": "CNNVD-201907-383"
},
{
"db": "NVD",
"id": "CVE-2019-13450"
}
]
},
"id": "VAR-201907-0716",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-21753"
}
],
"trust": 1.6
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"IoT",
"ICS"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-21753"
}
]
},
"last_update_date": "2024-11-23T22:06:08.079000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Top Page",
"trust": 0.8,
"url": "https://www.ringcentral.com/"
},
{
"title": "Zoom@zoom_us",
"trust": 0.8,
"url": "https://twitter.com/zoom_us/status/1148710712241295361"
},
{
"title": "VIDEO ON VULNERABILITY",
"trust": 0.8,
"url": "https://assets.zoom.us/docs/pdf/Zoom+Response+Video-On+Vulnerability.pdf"
},
{
"title": "Response to Video-On Concern",
"trust": 0.8,
"url": "https://blog.zoom.us/wordpress/2019/07/08/response-to-video-on-concern/"
},
{
"title": "Zoom Client Security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=94523"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-006352"
},
{
"db": "CNNVD",
"id": "CNNVD-201907-383"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-862",
"trust": 1.0
},
{
"problemtype": "CWE-284",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-006352"
},
{
"db": "NVD",
"id": "CVE-2019-13450"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.7,
"url": "https://news.ycombinator.com/item?id=20387298"
},
{
"trust": 2.0,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-13450"
},
{
"trust": 1.9,
"url": "https://twitter.com/moreati/status/1148548799813640193"
},
{
"trust": 1.9,
"url": "https://assets.zoom.us/docs/pdf/zoom+response+video-on+vulnerability.pdf"
},
{
"trust": 1.6,
"url": "https://twitter.com/zoom_us/status/1148710712241295361"
},
{
"trust": 1.6,
"url": "https://blog.zoom.us/wordpress/2019/07/08/response-to-video-on-concern/"
},
{
"trust": 1.6,
"url": "https://bugs.chromium.org/p/chromium/issues/detail?id=951540"
},
{
"trust": 1.6,
"url": "http://www.securityfocus.com/bid/109082"
},
{
"trust": 1.0,
"url": "https://medium.com/%40jonathan.leitschuh/zoom-zero-day-4-million-webcams-maybe-an-rce-just-get-them-to-visit-your-website-ac75c83f4ef5"
},
{
"trust": 0.9,
"url": "https://zoom.us/"
},
{
"trust": 0.9,
"url": "https://medium.com/@jonathan.leitschuh/zoom-zero-day-4-million-webcams-maybe-an-rce-just-get-them-to-visit-your-website-ac75c83f4ef5"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-13450"
},
{
"trust": 0.6,
"url": "https://medium.com/@jonathan.leitschuh/zoom"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-21753"
},
{
"db": "BID",
"id": "109082"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-006352"
},
{
"db": "CNNVD",
"id": "CNNVD-201907-383"
},
{
"db": "NVD",
"id": "CVE-2019-13450"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2019-21753"
},
{
"db": "BID",
"id": "109082"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-006352"
},
{
"db": "CNNVD",
"id": "CNNVD-201907-383"
},
{
"db": "NVD",
"id": "CVE-2019-13450"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-07-09T00:00:00",
"db": "CNVD",
"id": "CNVD-2019-21753"
},
{
"date": "2019-07-08T00:00:00",
"db": "BID",
"id": "109082"
},
{
"date": "2019-07-18T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-006352"
},
{
"date": "2019-07-08T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201907-383"
},
{
"date": "2019-07-09T06:15:10.820000",
"db": "NVD",
"id": "CVE-2019-13450"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-07-09T00:00:00",
"db": "CNVD",
"id": "CNVD-2019-21753"
},
{
"date": "2019-07-08T00:00:00",
"db": "BID",
"id": "109082"
},
{
"date": "2019-07-18T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-006352"
},
{
"date": "2020-08-25T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201907-383"
},
{
"date": "2024-11-21T04:24:55.590000",
"db": "NVD",
"id": "CVE-2019-13450"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201907-383"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Zoom Client and RingCentral Access control vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-006352"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "access control error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201907-383"
}
],
"trust": 0.6
}
}
CVE-2019-13450 (GCVE-0-2019-13450)
Vulnerability from nvd – Published: 2019-07-09 05:49 – Updated: 2024-08-04 23:49- n/a
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T23:49:25.076Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://medium.com/%40jonathan.leitschuh/zoom-zero-day-4-million-webcams-maybe-an-rce-just-get-them-to-visit-your-website-ac75c83f4ef5"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://assets.zoom.us/docs/pdf/Zoom+Response+Video-On+Vulnerability.pdf"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://news.ycombinator.com/item?id=20387298"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://blog.zoom.us/wordpress/2019/07/08/response-to-video-on-concern/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://twitter.com/moreati/status/1148548799813640193"
},
{
"name": "109082",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/109082"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://twitter.com/zoom_us/status/1148710712241295361"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://bugs.chromium.org/p/chromium/issues/detail?id=951540"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Zoom Client through 4.4.4 and RingCentral 7.0.136380.0312 on macOS, remote attackers can force a user to join a video call with the video camera active. This occurs because any web site can interact with the Zoom web server on localhost port 19421 or 19424. NOTE: a machine remains vulnerable if the Zoom Client was installed in the past and then uninstalled. Blocking exploitation requires additional steps, such as the ZDisableVideo preference and/or killing the web server, deleting the ~/.zoomus directory, and creating a ~/.zoomus plain file."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-07-12T11:44:02",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://medium.com/%40jonathan.leitschuh/zoom-zero-day-4-million-webcams-maybe-an-rce-just-get-them-to-visit-your-website-ac75c83f4ef5"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://assets.zoom.us/docs/pdf/Zoom+Response+Video-On+Vulnerability.pdf"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://news.ycombinator.com/item?id=20387298"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://blog.zoom.us/wordpress/2019/07/08/response-to-video-on-concern/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://twitter.com/moreati/status/1148548799813640193"
},
{
"name": "109082",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/109082"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://twitter.com/zoom_us/status/1148710712241295361"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://bugs.chromium.org/p/chromium/issues/detail?id=951540"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-13450",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In the Zoom Client through 4.4.4 and RingCentral 7.0.136380.0312 on macOS, remote attackers can force a user to join a video call with the video camera active. This occurs because any web site can interact with the Zoom web server on localhost port 19421 or 19424. NOTE: a machine remains vulnerable if the Zoom Client was installed in the past and then uninstalled. Blocking exploitation requires additional steps, such as the ZDisableVideo preference and/or killing the web server, deleting the ~/.zoomus directory, and creating a ~/.zoomus plain file."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://medium.com/@jonathan.leitschuh/zoom-zero-day-4-million-webcams-maybe-an-rce-just-get-them-to-visit-your-website-ac75c83f4ef5",
"refsource": "MISC",
"url": "https://medium.com/@jonathan.leitschuh/zoom-zero-day-4-million-webcams-maybe-an-rce-just-get-them-to-visit-your-website-ac75c83f4ef5"
},
{
"name": "https://assets.zoom.us/docs/pdf/Zoom+Response+Video-On+Vulnerability.pdf",
"refsource": "MISC",
"url": "https://assets.zoom.us/docs/pdf/Zoom+Response+Video-On+Vulnerability.pdf"
},
{
"name": "https://news.ycombinator.com/item?id=20387298",
"refsource": "MISC",
"url": "https://news.ycombinator.com/item?id=20387298"
},
{
"name": "https://blog.zoom.us/wordpress/2019/07/08/response-to-video-on-concern/",
"refsource": "MISC",
"url": "https://blog.zoom.us/wordpress/2019/07/08/response-to-video-on-concern/"
},
{
"name": "https://twitter.com/moreati/status/1148548799813640193",
"refsource": "MISC",
"url": "https://twitter.com/moreati/status/1148548799813640193"
},
{
"name": "109082",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/109082"
},
{
"name": "https://twitter.com/zoom_us/status/1148710712241295361",
"refsource": "MISC",
"url": "https://twitter.com/zoom_us/status/1148710712241295361"
},
{
"name": "https://bugs.chromium.org/p/chromium/issues/detail?id=951540",
"refsource": "MISC",
"url": "https://bugs.chromium.org/p/chromium/issues/detail?id=951540"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2019-13450",
"datePublished": "2019-07-09T05:49:07",
"dateReserved": "2019-07-09T00:00:00",
"dateUpdated": "2024-08-04T23:49:25.076Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2019-13450 (GCVE-0-2019-13450)
Vulnerability from cvelistv5 – Published: 2019-07-09 05:49 – Updated: 2024-08-04 23:49- n/a
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T23:49:25.076Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://medium.com/%40jonathan.leitschuh/zoom-zero-day-4-million-webcams-maybe-an-rce-just-get-them-to-visit-your-website-ac75c83f4ef5"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://assets.zoom.us/docs/pdf/Zoom+Response+Video-On+Vulnerability.pdf"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://news.ycombinator.com/item?id=20387298"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://blog.zoom.us/wordpress/2019/07/08/response-to-video-on-concern/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://twitter.com/moreati/status/1148548799813640193"
},
{
"name": "109082",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/109082"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://twitter.com/zoom_us/status/1148710712241295361"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://bugs.chromium.org/p/chromium/issues/detail?id=951540"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Zoom Client through 4.4.4 and RingCentral 7.0.136380.0312 on macOS, remote attackers can force a user to join a video call with the video camera active. This occurs because any web site can interact with the Zoom web server on localhost port 19421 or 19424. NOTE: a machine remains vulnerable if the Zoom Client was installed in the past and then uninstalled. Blocking exploitation requires additional steps, such as the ZDisableVideo preference and/or killing the web server, deleting the ~/.zoomus directory, and creating a ~/.zoomus plain file."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-07-12T11:44:02",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://medium.com/%40jonathan.leitschuh/zoom-zero-day-4-million-webcams-maybe-an-rce-just-get-them-to-visit-your-website-ac75c83f4ef5"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://assets.zoom.us/docs/pdf/Zoom+Response+Video-On+Vulnerability.pdf"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://news.ycombinator.com/item?id=20387298"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://blog.zoom.us/wordpress/2019/07/08/response-to-video-on-concern/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://twitter.com/moreati/status/1148548799813640193"
},
{
"name": "109082",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/109082"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://twitter.com/zoom_us/status/1148710712241295361"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://bugs.chromium.org/p/chromium/issues/detail?id=951540"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-13450",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In the Zoom Client through 4.4.4 and RingCentral 7.0.136380.0312 on macOS, remote attackers can force a user to join a video call with the video camera active. This occurs because any web site can interact with the Zoom web server on localhost port 19421 or 19424. NOTE: a machine remains vulnerable if the Zoom Client was installed in the past and then uninstalled. Blocking exploitation requires additional steps, such as the ZDisableVideo preference and/or killing the web server, deleting the ~/.zoomus directory, and creating a ~/.zoomus plain file."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://medium.com/@jonathan.leitschuh/zoom-zero-day-4-million-webcams-maybe-an-rce-just-get-them-to-visit-your-website-ac75c83f4ef5",
"refsource": "MISC",
"url": "https://medium.com/@jonathan.leitschuh/zoom-zero-day-4-million-webcams-maybe-an-rce-just-get-them-to-visit-your-website-ac75c83f4ef5"
},
{
"name": "https://assets.zoom.us/docs/pdf/Zoom+Response+Video-On+Vulnerability.pdf",
"refsource": "MISC",
"url": "https://assets.zoom.us/docs/pdf/Zoom+Response+Video-On+Vulnerability.pdf"
},
{
"name": "https://news.ycombinator.com/item?id=20387298",
"refsource": "MISC",
"url": "https://news.ycombinator.com/item?id=20387298"
},
{
"name": "https://blog.zoom.us/wordpress/2019/07/08/response-to-video-on-concern/",
"refsource": "MISC",
"url": "https://blog.zoom.us/wordpress/2019/07/08/response-to-video-on-concern/"
},
{
"name": "https://twitter.com/moreati/status/1148548799813640193",
"refsource": "MISC",
"url": "https://twitter.com/moreati/status/1148548799813640193"
},
{
"name": "109082",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/109082"
},
{
"name": "https://twitter.com/zoom_us/status/1148710712241295361",
"refsource": "MISC",
"url": "https://twitter.com/zoom_us/status/1148710712241295361"
},
{
"name": "https://bugs.chromium.org/p/chromium/issues/detail?id=951540",
"refsource": "MISC",
"url": "https://bugs.chromium.org/p/chromium/issues/detail?id=951540"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2019-13450",
"datePublished": "2019-07-09T05:49:07",
"dateReserved": "2019-07-09T00:00:00",
"dateUpdated": "2024-08-04T23:49:25.076Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}