Remote Command Injection Vulnerability in Zoom On-Premise Meeting Connectors
CVE-2021-34414

7.2HIGH

Summary

The network proxy configuration page in various Zoom on-premise products is susceptible to a vulnerability that allows attackers to potentially execute arbitrary commands. The flaw stems from inadequate input validation, enabling a web portal administrator to inadvertently introduce malicious commands, compromising the on-premise system's integrity. Affected products include older versions of the Meeting Connector, Recording Connector, and virtual room solutions, necessitating urgency in updates to mitigate risks.

Affected Version(s)

Zoom on-premise Meeting Connector Controller, Zoom on-premise Meeting Connector MMR, Zoom on-premise Recording Connector, Zoom on-premise Virtual Room Connector, Zoom on-premise Virtual Room Connector Load Balancer Zoom on-premise Meeting Connector Controller before version 4.6.348.20201217, Zoom on-premise Meeting Connector MMR before version 4.6.348.20201217, Zoom on-premise Recording Connector before version 3.8.42.20200905, Zoom on-premise Virtual Room Connector before version 4.4.6620.20201110, Zoom on-premise Virtual Room Connector Load Balancer before version 2.5.5495.20210326

References

CVSS V3.1

Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.