Lucene search

K

Meeting Connector Security Vulnerabilities

cve
cve

CVE-2021-34414

The network proxy page on the web portal for the Zoom on-premise Meeting Connector Controller before version 4.6.348.20201217, Zoom on-premise Meeting Connector MMR before version 4.6.348.20201217, Zoom on-premise Recording Connector before version 3.8.42.20200905, Zoom on-premise Virtual Room Conn...

7.2CVSS

7.3AI Score

0.001EPSS

2021-09-27 02:15 PM
28
cve
cve

CVE-2021-34415

The Zone Controller service in the Zoom On-Premise Meeting Connector Controller before version 4.6.358.20210205 does not verify the cnt field sent in incoming network packets, which leads to exhaustion of resources and system crash.

7.5CVSS

7.5AI Score

0.001EPSS

2021-09-27 02:15 PM
20
cve
cve

CVE-2021-34416

The network address administrative settings web portal for the Zoom on-premise Meeting Connector before version 4.6.360.20210325, Zoom on-premise Meeting Connector MMR before version 4.6.360.20210325, Zoom on-premise Recording Connector before version 3.8.44.20210326, Zoom on-premise Virtual Room C...

9.8CVSS

9.7AI Score

0.002EPSS

2021-09-27 02:15 PM
25
cve
cve

CVE-2022-28750

Zoom On-Premise Meeting Connector Zone Controller (ZC) before version 4.8.20220419.112 fails to properly parse STUN error codes, which can result in memory corruption and could allow a malicious actor to crash the application. In versions older than 4.8.12.20211115, this vulnerability could also be...

9.8CVSS

9.6AI Score

0.002EPSS

2022-08-11 03:15 PM
44
2
cve
cve

CVE-2022-28753

Zoom On-Premise Meeting Connector MMR before version 4.8.129.20220714 contains an improper access control vulnerability. As a result, a malicious actor can join a meeting which they are authorized to join without appearing to the other participants, can admit themselves into the meeting from the wa...

7.1CVSS

5.5AI Score

0.001EPSS

2022-08-11 03:15 PM
34
2
cve
cve

CVE-2022-28754

Zoom On-Premise Meeting Connector MMR before version 4.8.129.20220714 contains an improper access control vulnerability. As a result, a malicious actor can join a meeting which they are authorized to join without appearing to the other participants, can admit themselves into the meeting from the wa...

7.1CVSS

5.5AI Score

0.001EPSS

2022-08-11 03:15 PM
35
3