Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2019-13450

Опубликовано: 09 июл. 2019
Источник: nvd
CVSS3: 6.5
CVSS2: 4.3
EPSS Низкий

Описание

In the Zoom Client through 4.4.4 and RingCentral 7.0.136380.0312 on macOS, remote attackers can force a user to join a video call with the video camera active. This occurs because any web site can interact with the Zoom web server on localhost port 19421 or 19424. NOTE: a machine remains vulnerable if the Zoom Client was installed in the past and then uninstalled. Blocking exploitation requires additional steps, such as the ZDisableVideo preference and/or killing the web server, deleting the ~/.zoomus directory, and creating a ~/.zoomus plain file.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:ringcentral:ringcentral:7.0.136380.0312:*:*:*:*:mac_os_x:*:*
cpe:2.3:a:zoom:zoom:*:*:*:*:*:mac_os_x:*:*
Версия до 4.4.4 (включая)

EPSS

Процентиль: 70%
0.00629
Низкий

6.5 Medium

CVSS3

4.3 Medium

CVSS2

Дефекты

CWE-862

Связанные уязвимости

CVSS3: 6.5
github
больше 3 лет назад

In the Zoom Client through 4.4.4 and RingCentral 7.0.136380.0312 on macOS, remote attackers can force a user to join a video call with the video camera active. This occurs because any web site can interact with the Zoom web server on localhost port 19421 or 19424. NOTE: a machine remains vulnerable if the Zoom Client was installed in the past and then uninstalled. Blocking exploitation requires additional steps, such as the ZDisableVideo preference and/or killing the web server, deleting the ~/.zoomus directory, and creating a ~/.zoomus plain file.

EPSS

Процентиль: 70%
0.00629
Низкий

6.5 Medium

CVSS3

4.3 Medium

CVSS2

Дефекты

CWE-862