Vulnerability Details : CVE-2022-28751
The Zoom Client for Meetings for MacOS (Standard and for IT Admin) before version 5.11.3 contains a vulnerability in the package signature validation during the update process. A local low-privileged user could exploit this vulnerability to escalate their privileges to root.
Exploit prediction scoring system (EPSS) score for CVE-2022-28751
Probability of exploitation activity in the next 30 days: 0.04%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 6 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2022-28751
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
8.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H |
2.0
|
6.0
|
Zoom Video Communications, Inc. |
CWE ids for CVE-2022-28751
-
The product does not verify, or incorrectly verifies, the cryptographic signature for data.Assigned by:
- nvd@nist.gov (Primary)
- security@zoom.us (Secondary)
References for CVE-2022-28751
-
https://explore.zoom.us/en/trust/security/security-bulletin/
Security Bulletin - ZoomVendor Advisory
Products affected by CVE-2022-28751
- cpe:2.3:a:zoom:meetings:*:*:*:*:*:macos:*:*