CVE-2024-33530

7.5 HIGH

📋 TL;DR

A logic flaw in Jitsi Meet's lobby feature for password-protected meetings allows unauthorized disclosure of the meeting password when inviting users from the lobby. This affects all Jitsi Meet instances using password protection with lobbies enabled. Attackers could obtain meeting credentials without proper authentication.

💻 Affected Systems

Products:
  • Jitsi Meet
Versions: All versions before 9391
Operating Systems: All platforms running Jitsi Meet
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects meetings using both password protection AND lobby feature simultaneously.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Unauthorized parties gain access to sensitive meetings, potentially exposing confidential discussions, business data, or personal information shared in secure video conferences.

🟠

Likely Case

Meeting passwords are exposed to users who shouldn't have them, allowing unauthorized access to meetings that were intended to be restricted.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to potential password exposure without actual meeting compromise if detected quickly.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires being invited to a meeting lobby, then triggering the logic flaw to obtain the password.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 9391 and later

Vendor Advisory: https://github.com/jitsi/jitsi-meet/releases/tag/stable-9391

Restart Required: Yes

Instructions:

1. Update Jitsi Meet to version 9391 or later. 2. Restart Jitsi services. 3. Verify the update was successful.

🔧 Temporary Workarounds

Disable Lobby Feature

all

Temporarily disable the lobby feature for password-protected meetings

Modify Jitsi configuration to disable lobby: set 'enableLobby' to false in config.js

Use Alternative Authentication

all

Use domain-based authentication instead of password protection

Configure Jitsi to require authenticated users from specific domains

🧯 If You Can't Patch

  • Disable password-protected meetings with lobbies entirely
  • Implement network segmentation to restrict Jitsi access to trusted users only

🔍 How to Verify

Check if Vulnerable:

Check Jitsi Meet version - if below 9391 and using password protection with lobby, system is vulnerable.

Check Version:

Check Jitsi Meet web interface or package version: dpkg -l | grep jitsi-meet-web or check package manager

Verify Fix Applied:

Verify Jitsi Meet version is 9391 or higher and test password-protected meetings with lobby feature.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed lobby join attempts followed by successful access
  • Unusual pattern of users joining password-protected meetings

Network Indicators:

  • Unexpected access to password-protected meeting rooms
  • Traffic patterns suggesting password harvesting

SIEM Query:

source="jitsi" AND (event="lobby_join" OR event="password_access") | stats count by user, meeting_id

🔗 References

📤 Share & Export