CVE-2024-45424

5.3 MEDIUM

📋 TL;DR

A business logic error in certain Zoom Workplace applications allows unauthenticated attackers to access sensitive information via network access. This affects organizations using vulnerable Zoom Workplace apps, potentially exposing internal data to external parties.

💻 Affected Systems

Products:
  • Zoom Workplace Apps
Versions: Specific versions not detailed in advisory; check Zoom security bulletin ZSB-24036
Operating Systems: Multiple platforms (Windows, macOS, Linux, mobile)
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability requires network access to affected Zoom Workplace applications.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Unauthenticated attackers could access sensitive business information, internal communications, or proprietary data stored within Zoom Workplace applications.

🟠

Likely Case

Information disclosure of non-critical data such as user directories, meeting metadata, or configuration details.

🟢

If Mitigated

Limited exposure with proper network segmentation and access controls in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access but no authentication, making it relatively straightforward for attackers with network visibility.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Zoom security bulletin ZSB-24036 for specific patched versions

Vendor Advisory: https://www.zoom.com/en/trust/security-bulletin/zsb-24036/

Restart Required: Yes

Instructions:

1. Review Zoom security bulletin ZSB-24036. 2. Update all Zoom Workplace applications to the latest patched version. 3. Restart applications after update. 4. Verify update completion.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to Zoom Workplace applications using firewalls or network policies

Access Control Lists

all

Implement strict ACLs to limit which IP addresses can communicate with Zoom Workplace applications

🧯 If You Can't Patch

  • Implement network segmentation to isolate Zoom Workplace applications from untrusted networks
  • Deploy web application firewalls (WAF) with rules to detect and block information disclosure attempts

🔍 How to Verify

Check if Vulnerable:

Check Zoom application version against patched versions listed in ZSB-24036 security bulletin

Check Version:

Zoom desktop: Help > About; Zoom mobile: Settings > About

Verify Fix Applied:

Confirm Zoom Workplace applications are updated to versions specified in Zoom's security bulletin

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to Zoom Workplace applications
  • Multiple failed authentication attempts followed by successful unauthenticated requests

Network Indicators:

  • Unusual traffic to Zoom application ports from unexpected sources
  • Information disclosure patterns in network traffic

SIEM Query:

source="zoom*" AND (event_type="access" OR event_type="request") AND auth_status="unauthenticated" AND result="success"

🔗 References

📤 Share & Export