The Zoom Client for Meetings (for Android, iOS, Linux, MacOS, and Windows) before version 5.10.0 failed to properly parse XML stanzas in XMPP messages. This can allow a malicious user to break out of the current XMPP message context and create a new message context to have the receiving users client perform a variety of actions.This issue could be used in a more sophisticated attack to forge XMPP messages from the server.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://explore.zoom.us/en/trust/security/security-bulletin |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: Zoom
Published:
Updated: 2024-09-16T17:59:18.129Z
Reserved: 2022-01-07T00:00:00
Link: CVE-2022-22784

No data.

Status : Modified
Published: 2022-05-18T16:15:08.637
Modified: 2024-11-21T06:47:26.633
Link: CVE-2022-22784

No data.