The version of Zoom Client for Meetings installed on the remote host is prior to 4.4.5. It is, therefore, affected by a vulnerability as referenced in the ZSB-19002 advisory.
Note that Nessus has not tested for this issue but has instead relied only on the application’s self-reported version number.
#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
##
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(168819);
script_version("1.6");
script_set_attribute(attribute:"plugin_modification_date", value:"2023/10/20");
script_cve_id("CVE-2019-13450");
script_xref(name:"CEA-ID", value:"CEA-2019-0540");
script_name(english:"Zoom Client for Meetings < 4.4.5 Vulnerability (ZSB-19002)");
script_set_attribute(attribute:"synopsis", value:
"The remote host has an application installed that is affected by a vulnerability.");
script_set_attribute(attribute:"description", value:
"The version of Zoom Client for Meetings installed on the remote host is prior to 4.4.5. It is, therefore, affected by a
vulnerability as referenced in the ZSB-19002 advisory.
- A vulnerability in the macOS Zoom and RingCentral clients could allow a remote, unauthenticated attacker
to force a user to join a video call with the video camera active. The vulnerability is due to
insufficient authorization controls to check which systems may communicate with the local Zoom Web server
running on port 19421. An attacker could exploit this vulnerability by creating a malicious website that
causes the Zoom client to automatically join a meeting set up by the attacker. Zoom implemented a new
Video Preview dialog that is presented to the user before joining a meeting in Client version 4.4.5
published July 14, 2019. This dialog enables the user to join the meeting with or without video enabled
and requires the user to set their desired default behavior for video. Zoom urges customers to install the
latest Zoom Client release available at https://zoom.us/download. (CVE-2019-13450)
Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version
number.");
# https://explore.zoom.us/en/trust/security/security-bulletin/?filter-cve=&filter=&keywords=ZSB-19002
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?be7ce1bf");
script_set_attribute(attribute:"solution", value:
"Upgrade to Zoom Client for Meetings 4.4.5 or later.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N");
script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N");
script_set_cvss3_temporal_vector("CVSS:3.0/E:H/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2019-13450");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"exploited_by_malware", value:"true");
script_set_attribute(attribute:"vuln_publication_date", value:"2019/07/09");
script_set_attribute(attribute:"patch_publication_date", value:"2019/07/09");
script_set_attribute(attribute:"plugin_publication_date", value:"2022/12/15");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/a:zoom:zoom");
script_set_attribute(attribute:"cpe", value:"cpe:/a:zoom:meetings");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"MacOS X Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2022-2023 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("macosx_zoom_installed.nbin");
script_require_keys("Host/local_checks_enabled", "installed_sw/zoom");
exit(0);
}
include('vcf.inc');
var app_info = NULL;
if (get_kb_item('installed_sw/Zoom Client for Meetings'))
app_info = vcf::get_app_info(app:'Zoom Client for Meetings', win_local:TRUE);
else
app_info = vcf::get_app_info(app:'zoom');
vcf::check_granularity(app_info:app_info, sig_segments:3);
vcf::check_all_backporting(app_info:app_info);
var constraints = [
{ 'fixed_version' : '4.4.5' }
];
vcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_WARNING);