vulnerability
Zoom: CVE-2019-13450: Information Disclosure (webcam) Vulnerability
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
4 | (AV:N/AC:M/Au:N/C:P/I:N/A:N) | 2019-07-09 | 2019-07-09 | 2023-11-15 |
Severity
4
CVSS
(AV:N/AC:M/Au:N/C:P/I:N/A:N)
Published
2019-07-09
Added
2019-07-09
Modified
2023-11-15
Description
In the Zoom Client through 4.4.4 and RingCentral 7.0.136380.0312 on macOS, remote attackers can force a user to
join a video call with the video camera active. This occurs because any web site can interact with the Zoom web
server on localhost port 19421 or 19424. NOTE: a machine remains vulnerable if the Zoom Client was installed in
the past and then uninstalled. Blocking exploitation requires additional steps, such as the ZDisableVideo
preference and/or killing the web server, deleting the ~/.zoomus directory, and creating a ~/.zoomus plain file.
Solution(s)
zoom-cve-2019-13450-workaroundzoom-mac-upgrade-4_4_53932_0709
References
- CVE-2019-13450
- https://attackerkb.com/topics/CVE-2019-13450
- URL-https://blog.zoom.us/wordpress/2019/07/08/response-to-video-on-concern/
- URL- https://medium.com/@jonathan.leitschuh/zoom-zero-day-4-million-webcams-maybe-an-rce-just-get-them-to-visit-your-website-ac75c83f4ef5
- URL-https://blog.rapid7.com/2019/07/10/zoom-video-snooping-what-you-need-to-know/

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.