Latest Research

This content is currently locked.

Your current Info-Tech Research Group subscription does not include access to this content. Contact your account representative to gain access to Premium SoftwareReviews.

Contact Your Representative
Or Call Us:
1-888-670-8889 (US/CAN) or
+1-519-432-3550 (International)

Comprehensive software reviews to make better IT decisions

Two New Zoom Vulnerabilities Uncovered – Upgrade Now!

June 2020

Two new vulnerabilities in Zoom’s web conferencing software were discovered in early June 2020. These vulnerabilities could allow malicious actors the ability to execute arbitrary code on target hosts and exploit path traversal vulnerabilities in the software. Zoom’s latest update addresses and remediates the vulnerabilities.

Path Traversal attacks enable access to files and directories outside of a web root folder, which would allow a malicious actor to access files stored on a system that were not meant to be publicly available to the web application.

The vulnerabilities were uncovered by Cisco Talos and are listed under Common Vulnerabilities and Exposures (CVE) ID numbers CVE-2020-6109 and CVE-2020-6110. CVE-2020-6109 affects GIPHY, the messaging and animated GIF application. CVE-2020-6110 exploits a chat code snippet in Zoom.

The vulnerabilities are found in version 4.6 of Zoom, one of which “impacts Zoom 4.6.10, 4.6.11 and likely earlier versions, [while the other] only affects 4.6.10 and earlier.”, according to Security Week.

Source: SoftwareReviews. Accessed June 9, 2020

Both vulnerabilities have been addressed in Zoom’s 5.0 update, released in May 2020. Zoom has addressed the vulnerabilities on both the server and client; software on client workstations will need to be upgraded manually.

Our Take

Upgrade your end-user workstations to the latest Zoom software! The patches released by Zoom address issues on the client software distributed and installed on user workstations. Therefore, IT departments are strongly encouraged to roll out the patch as soon as possible and ensure that all users comply with direction to upgrade their software.

Systems administrators can either distribute the update via your organization’s software distribution tools or have end users execute the upgrade on their own. As a standard practice, we recommend conducing a risk assessment of all software patches to identify urgency and to schedule their installation or deployment accordingly.

Stay tuned to Info-Tech’s Tech Briefs; we will report on developments as they transpire.

Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019