Zoom, the widely used video conferencing platform, has recently patched a series of vulnerabilities in its desktop and mobile applications, including a critical flaw in its Windows software. Here’s a detailed look at the situation, the actions taken by Zoom, and recommendations for users and organizations to enhance their security posture.
Zoom has identified seven vulnerabilities across its desktop and mobile applications, with a particularly critical vulnerability found in the Windows version of its software. The Zoom Windows vulnerability, known as CVE-2024-24691, is rated 9.6 on the CVSS scale, indicating its severity. It involves improper input validation, which could potentially allow an attacker with network access to escalate privileges without authorization.
Another notable vulnerability is CVE-2024-24697, a high-severity issue that could allow for privilege escalation through local exploitation without the need for authentication. This and other vulnerabilities highlight the potential risks associated with using Zoom’s applications without the latest security updates.
In response to these findings, Zoom has released patches to address the vulnerabilities and recommends that users update their applications to the latest versions. This proactive approach aims to mitigate security risks and protect users from potential exploitation.
At Nuspire, we are committed to ensuring the security of our clients. We actively apply patches in accordance with vendor recommendations and threat hunt client environments for indications of compromise. Our team is constantly monitoring the situation and will provide updates as necessary.
To ensure the security of their systems, users and organizations utilizing Zoom’s Windows applications are advised to take immediate action: