Home

Description

The Zoom Client for Meetings (for Android, iOS, Linux, MacOS, and Windows) before version 5.10.0 failed to properly parse XML stanzas in XMPP messages. This can allow a malicious user to break out of the current XMPP message context and create a new message context to have the receiving users client perform a variety of actions.This issue could be used in a more sophisticated attack to forge XMPP messages from the server.

PUBLISHED Reserved 2022-01-07 | Published 2022-05-18 | Updated 2024-09-16 | Assigner Zoom




HIGH: 8.1CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

Problem types

Improper Input Validation

Product status

Any version before 5.10.0
affected

Any version before 5.10.0
affected

Any version before 5.10.0
affected

Any version before 5.10.0
affected

Any version before 5.10.0
affected

Credits

Ivan Fratric of Google Project Zero

References

explore.zoom.us/en/trust/security/security-bulletin

explore.zoom.us/en/trust/security/security-bulletin

cve.org (CVE-2022-22784)

nvd.nist.gov (CVE-2022-22784)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.