Zoom Client Application Chat Code Snippet Remote Code Execution Vulnerability [CVE-2020-6110]

CVE Number – CVE-2020-6110

An exploitable partial path traversal vulnerability exists in the way Zoom Client version 4.6.10 processes messages including shared code snippets.

A specially crafted chat message can cause an arbitrary binary planting which could be abused to achieve arbitrary code execution. An attacker needs to send a specially crafted message to a target user or a group to trigger this vulnerability.

For the most severe effect, target user interaction is required.

Talos confirms the issue was fixed in 4.6.12 and confirms 4.6.10 and 4.6.11 (and likely prior) were vulnerable

Tested Versions

Zoom Client Application 4.6.10 Zoom Client Application 4.6.11

CREDIT

Discovered by a member of Cisco Talos.

Duncan Newell

Duncan is a technology professional with over 20 years experience of working in various IT roles. He has a interest in cyber security, and has a wide range of other skills in radio, electronics and telecommunications.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

%d bloggers like this: