8.8
CVE-2024-45418
- EPSS 0.06%
- Published 25.02.2025 20:15:35
- Last modified 04.03.2025 17:22:39
- Source security@zoom.us
- Teams watchlist Login
- Open Login
Symlink following in the installer for some Zoom apps for macOS before version 6.1.5 may allow an authenticated user to conduct an escalation of privilege via network access.
Data is provided by the National Vulnerability Database (NVD)
Zoom ≫ Meeting Software Development Kit SwPlatformmacos Version < 6.1.5
Zoom ≫ Video Software Development Kit SwPlatformmacos Version < 6.1.5
Zoom ≫ Workplace Desktop SwPlatformmacos Version < 6.1.5
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.06% | 0.177 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
security@zoom.us | 5.4 | 2.3 | 2.7 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
|
CWE-59 Improper Link Resolution Before File Access ('Link Following')
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
CWE-61 UNIX Symbolic Link (Symlink) Following
The product, when opening a file or directory, does not sufficiently account for when the file is a symbolic link that resolves to a target outside of the intended control sphere. This could allow an attacker to cause the product to operate on unauthorized files.