CVE-2020-6110: Zoom vulnerability

An exploitable partial path traversal vulnerability exists in the way Zoom Client version 4.6.10 processes messages including shared code snippets. A specially crafted chat message can cause an arbitrary binary planting which could be abused to achieve arbitrary code execution. An attacker needs to send a specially crafted message to a target user or a group to trigger this vulnerability. For the most severe effect, target user interaction is required.

How to mitigate CVE-2020-6110

Time needed: 5 minutes.

Follow the instructions, as they will assist you in mitigating the Zoom vulnerability that been reported in CVE-2020-6110.

  1. Install the latest version of Zoom

    Navigate to the official Zoom website and download the latest version of Zoom. The latest version contains the CVE-2020-6110 fix.
    Update to the latest version

  2. Perform a vulnerability assessment

    Perform a scan on your Zoom environment(s), and check for vulnerabilities. Verify if CVE-2020-6110 has been mitigated.

  3. Utilize the references

    The CVE-2020-6110 references have been provided for a reason. Utilize these references and make sure that you are correctly informed.

References

  • talosintelligence.com/vulnerability_reports/TALOS-2020-1056
  • Share this information