Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 15, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 15, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 15, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 15, 2025

      Intel’s latest Arc graphics driver is ready for DOOM: The Dark Ages, launching for Premium Edition owners on PC today

      May 15, 2025

      NVIDIA’s drivers are causing big problems for DOOM: The Dark Ages, but some fixes are available

      May 15, 2025

      Capcom breaks all-time profit records with 10% income growth after Monster Hunter Wilds sold over 10 million copies in a month

      May 15, 2025

      Microsoft plans to lay off 3% of its workforce, reportedly targeting management cuts as it changes to fit a “dynamic marketplace”

      May 15, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      A cross-platform Markdown note-taking application

      May 15, 2025
      Recent

      A cross-platform Markdown note-taking application

      May 15, 2025

      AI Assistant Demo & Tips for Enterprise Projects

      May 15, 2025

      Celebrating Global Accessibility Awareness Day (GAAD)

      May 15, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Intel’s latest Arc graphics driver is ready for DOOM: The Dark Ages, launching for Premium Edition owners on PC today

      May 15, 2025
      Recent

      Intel’s latest Arc graphics driver is ready for DOOM: The Dark Ages, launching for Premium Edition owners on PC today

      May 15, 2025

      NVIDIA’s drivers are causing big problems for DOOM: The Dark Ages, but some fixes are available

      May 15, 2025

      Capcom breaks all-time profit records with 10% income growth after Monster Hunter Wilds sold over 10 million copies in a month

      May 15, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»CERT-In Flags Critical Vulnerabilities in Zoom: Update Your Apps Now

    CERT-In Flags Critical Vulnerabilities in Zoom: Update Your Apps Now

    November 22, 2024

    Zoom Vulnerabilities

    The Indian Computer Emergency Response Team (CERT-In) has issued a detailed security advisory about multiple vulnerabilities found in the popular video conferencing application, Zoom.  

    These Zoom vulnerabilities identified across various versions of Zoom’s software, targets users by potentially allowing attackers to gain unauthorized access to sensitive information, escalate privileges, or disrupt service. 

    The vulnerabilities are present in several Zoom products, including the Zoom Workplace App, Zoom Rooms Client, and Zoom Video SDK, across multiple operating systems such as macOS, iOS, Windows, Linux, and Android.  

    Zoom Vulnerabilities Targeting Unsuspecting Users 

    The vulnerabilities impact a wide range of Zoom applications, primarily those before version 6.2.0. Affected products include: 

    • Zoom Workplace App for macOS, iOS, Windows, Linux, and Android before version 6.2.0. 
    • Zoom Rooms Client for Windows, iPad, and macOS before version 6.2.0. 
    • Zoom Rooms Controller for multiple platforms (Windows, macOS, Linux, Android) before version 6.2.0. 
    • Zoom Video SDK and Zoom Meeting SDK for macOS, iOS, Windows, Linux, and Android before version 6.2.0. 
    • Zoom Workplace VDI Client for Windows before version 6.1.12 (except version 6.0.14). 

    The vulnerabilities found in these products stem from various issues such as improper input validation, buffer overflows, symlink following, and uncontrolled resource consumption. These weaknesses could lead to malicious consequences, ranging from unauthorized access to a system, privilege escalation, and even denial of service (DoS) conditions. 

    Details of the Vulnerabilities in Zoom 

    1. Improper Input Validation (CVE-2024-45422)

    One of the most critical vulnerabilities, reported under CVE-2024-45422, involves improper input validation in Zoom Apps. Before version 6.2.0, this flaw could allow an unauthenticated user to launch a denial of service (DoS) attack via network access. The issue affects the Zoom Workplace App on multiple platforms, including macOS, iOS, Windows, Linux, and Android. 

    The CVSS severity of this vulnerability is classified as medium, with a CVSS score of 6.5. Users are strongly encouraged to apply updates promptly in order to prevent potential disruptions that could arise from this issue. 

    2. Buffer Overflow Vulnerability (CVE-2024-45421)

    Another critical vulnerability, identified as CVE-2024-45421, relates to a buffer overflow in some Zoom Apps. This flaw can be exploited by an authenticated user to escalate privileges via network access. It affects versions of the Zoom Workplace App, Zoom Rooms Client, and Zoom Video SDK across multiple platforms. 

    The CVSS severity of this vulnerability is classified as high, with a CVSS score of 8.5. Given its high-risk nature, this vulnerability could enable attackers to gain elevated privileges, potentially granting them full control over the affected system.  

    3. Uncontrolled Resource Consumption (CVE-2024-45420)

    CVE-2024-45420 describes a vulnerability in Zoom Apps that leads to uncontrolled resource consumption. This flaw allows an authenticated user to execute a denial of service (DoS) attack via network access, which could result in system slowdown or complete disruption of the service. 

    The CVSS severity of this vulnerability is classified as medium, with a CVSS score of 4.3. Affected versions include the Zoom Workplace App and Zoom Rooms Client, among others. This vulnerability impacts systems across multiple platforms, including Windows, macOS, and iOS.

    4. Symlink Following (CVE-2024-45418)

    A lesser-severity vulnerability, CVE-2024-45418, exists due to symlink following in the installer of some Zoom apps for macOS. This flaw could enable an authenticated user to escalate privileges, potentially leading to unauthorized access or modification of system files. 

    The CVSS severity of this flaw is classified as medium, with a CVSS score of 5.4. It affects the Zoom Workplace App for macOS, as well as other Zoom products on macOS, versions prior to 6.1.5. 

    5. Improper Input Validation and Information Disclosure (CVE-2024-45419)

    This vulnerability, identified as CVE-2024-45419, allows for improper input validation, which may result in the disclosure of sensitive information. An unauthenticated user could exploit this flaw to access sensitive data via network access, posing a significant security threat. 

    This vulnerability is classified as high, with a CVSS score of 8.1. It is present in several Zoom apps and impacts multiple operating systems, including Windows, macOS, iOS, Android, and Linux. 

    6. Uncontrolled Resource Consumption in macOS Installers (CVE-2024-45417)

    The final vulnerability in the list, CVE-2024-45417, pertains to uncontrolled resource consumption in the installer for some Zoom apps for macOS. This flaw can lead to information disclosure through local access, especially in cases where a privileged user executes malicious code. 

    This vulnerability, with a CVSS severity of medium and a score of 6.0, affects several Zoom products for macOS, including the Zoom Workplace App, Zoom Meeting SDK, and Zoom Video SDK. 

    Conclusion  

    Timely updates are important due to the high severity of vulnerabilities in Zoom products. CERT-In has urged all users to apply the latest patches to protect against potential threats. These vulnerabilities pose substantial risks, including unauthorized access to sensitive data and service disruptions that can impact both individuals and organizations.  

    Zoom has acknowledged the issues and released updates to address them, available on their website. This highlights the importance of regular software updates in maintaining cybersecurity. CERT-In’s efforts to identify these vulnerabilities demonstrate its commitment to securing digital infrastructures, and by following best practices, users can reduce the risk of exploitation and protect their information. 

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleUnlocking Google Workspace Security: Are You Doing Enough to Protect Your Data?
    Next Article Microsoft, Meta, and DOJ Disrupt Global Cybercrime and Fraudulent Networks

    Related Posts

    Development

    February 2025 Baseline monthly digest

    May 15, 2025
    Artificial Intelligence

    Markus Buehler receives 2025 Washington Award

    May 15, 2025
    Leave A Reply Cancel Reply

    Hostinger

    Continue Reading

    Ngioweb Botnet Fuels NSOCKS Residential Proxy Network Exploiting IoT Devices

    Development

    Build & Deploy a Full Stack Dating App

    Development

    Pentesters: Is AI Coming for Your Role?

    Development

    The 10 Best Hosting Packages for WordPress Developers

    Learning Resources

    Highlights

    Development

    Selenium and Python – How to click submit button

    May 7, 2024

    This is the source code of the webpage ( https://eu.luxpowertek.com/WManage/web/login ) I am trying to login in and click the submit button.
    <div id=”loginFormContainer” style=”margin: 0 auto; width: 450px; position: relative;”>
    <form id=”loginHolder” action=”/WManage/web/login” method=”post”>
    <h2 class=”title” style=”text-align: center; margin-top: 0;”>
    Monitor Center
    </h2>
    <div class=”form-horizontal” style=”padding: 10px 10px 0 10px;”>

    <div class=”form-group”>
    <div class=”input-group col-sm-12″>
    <span class=”input-group-addon” style=”width: 45px;”><img src=”https://resource.solarcloudsystem.com/WManage/web/img/format/icons/user.png?v=2.0.4.4″ height=”16″ /></span>
    <input type=”text” class=”form-control input-lg” id=”account” name=”account” value=”” maxLength=”30″ autofocus autocomplete=”off” placeholder=”Please enter username”>
    </div>
    </div>
    <div class=”form-group” style=”margin-bottom: 10px;”>
    <div class=”input-group col-sm-12″>
    <span class=”input-group-addon” style=”width: 45px;”><img src=”https://resource.solarcloudsystem.com/WManage/web/img/format/icons/key.png?v=2.0.4.4″ height=”16″ /></span>
    <input type=”password” class=”form-control input-lg” id=”password” name=”password” maxLength=”50″ placeholder=”Please enter password”>
    </div>

    </div>

    <div style=”width: 100%; margin-bottom: 10px;”>
    <a href=”forgetPassword” style=”float: right; color: inherit;” target=”_blank”>Forget password?</a>
    <div style=”clear: both;”></div>
    </div>

    <div class=”form-group”>
    <button type=”submit” class=”btn btn-lg btn-success” style=”width: calc(100% – 115px); margin-right: 5px;”>Sign in</button>
    <a class=”btn btn-lg btn-default” style=”width: 106px;” href=”/WManage/web/register”>Register</a>
    </div>

    <div class=”form-group” style=”margin-bottom: 5px;”>

    <a href=”/WManage/web/login/viewDemoPlant?customCompany=” type=”button” class=”btn btn-lg btn-success” style=”width: calc(100% – 115px); margin-right: 5px;”>Visit demo station</a>

    <a class=”btn btn-lg btn-default” style=”width: 106px;” href=”/WManage/web/warranty/register”>Warranty</a>
    </div>
    </div>
    </form>
    </div>

    Here is my python code with all the various different ways I have tried so far to click the button. The username and password are just dummy code in this sample.
    from selenium import webdriver
    from selenium.webdriver.common.by import By
    from selenium.webdriver.chrome.service import Service
    service = Service(‘/usr/bin/chromedriver’)

    driver = webdriver.Chrome(service=service)
    driver.get(‘https://eu.luxpowertek.com/WManage/web/login’)

    username = “uyuytuyreue745@mygmail.com”
    password = “kinghferyrt”

    # find username/email field and send the username itself to the input field
    driver.find_element(“id”, “account”).send_keys(username)
    # find password input field and insert password as well
    driver.find_element(“id”, “password”).send_keys(password)
    # click login button
    driver.find_element(By.XPATH(“(//button[contains(text(),’Sign In’)])[2]”));

    So the actual submit button has no ID and this is where I think I am getting confues will all the different ways of selecting it like by Selector, By XPATH by.xxxxx etc
    Sign in
    Any help would be most appreciated, also it appears that the code syntax of selenium has changed over the years as many code samples I have found do not work any more like driver.find_element_by_xpath which is now (I believe) driver.find_element(By.XPATH,xxxx)

    One Exploit, $2.6 Million Lost: MorphoBlue Hack Rattles DeFi Markets

    One Exploit, $2.6 Million Lost: MorphoBlue Hack Rattles DeFi Markets

    April 11, 2025

    NIST Hires External Contractor to Help Tackle National Vulnerability Database Backlog

    May 31, 2024

    Building SaaS Website #08: Localization (Multi-Language Website)

    February 10, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.