CVE-2024-27239

4.3 MEDIUM

📋 TL;DR

A use-after-free vulnerability in Zoom Workplace Apps and SDKs allows authenticated users to cause denial of service through network access. This affects users of vulnerable Zoom applications who have network connectivity to the affected systems. The vulnerability requires authentication but could disrupt service availability.

💻 Affected Systems

Products:
  • Zoom Workplace Apps
  • Zoom SDKs
Versions: Specific versions not detailed in advisory; check Zoom security bulletin ZSB-24018
Operating Systems: Windows, macOS, Linux, iOS, Android
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access; affects both client applications and SDK integrations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service disruption for Zoom applications, requiring restart or reinstallation of affected software.

🟠

Likely Case

Temporary application crashes or instability affecting individual users or small groups.

🟢

If Mitigated

Minimal impact with proper network segmentation and authentication controls limiting exploit scope.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access and network connectivity; use-after-free vulnerabilities typically require specific conditions to trigger.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Zoom security bulletin ZSB-24018 for specific patched versions

Vendor Advisory: https://www.zoom.com/en/trust/security-bulletin/zsb-24018/

Restart Required: Yes

Instructions:

1. Visit Zoom security bulletin ZSB-24018. 2. Identify affected products and versions. 3. Update to latest patched versions. 4. Restart applications/services.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to Zoom applications to trusted users only

Authentication Controls

all

Implement strong authentication and limit user privileges

🧯 If You Can't Patch

  • Implement strict network access controls to limit exposure
  • Monitor for abnormal application crashes or denial of service patterns

🔍 How to Verify

Check if Vulnerable:

Check application version against Zoom security bulletin ZSB-24018

Check Version:

Zoom applications: Check About or Settings menu; SDKs: Check integration documentation

Verify Fix Applied:

Verify application version matches or exceeds patched versions listed in ZSB-24018

📡 Detection & Monitoring

Log Indicators:

  • Unexpected application crashes
  • Memory access violation errors
  • Denial of service events

Network Indicators:

  • Unusual network patterns to Zoom applications
  • Multiple authentication attempts

SIEM Query:

source="zoom" AND (event_type="crash" OR event_type="dos")

🔗 References

📤 Share & Export