CVE-2021-34420
low-risk
Published 2021-11-11
The Zoom Client for Meetings for Windows installer before version 5.5.4 does not properly verify the signature of files with .msi, .ps1, and .bat extensions. This could lead to a malicious actor installing malicious software on a customer’s computer.
Do I need to act?
-
0.12% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
4
CVSS 4.7/10
Medium
NETWORK
/ LOW complexity
Affected Products (1)
Zoom Client For Meetings
Affected Vendors
References (4)
Vendor Advisory
https://explore.zoom.us/en/trust/security/security-bulletin
Third Party Advisory
https://medium.com/manomano-tech/a-red-team-operation-leveraging-a-zero-day-vuln...
Vendor Advisory
https://explore.zoom.us/en/trust/security/security-bulletin
Third Party Advisory
https://medium.com/manomano-tech/a-red-team-operation-leveraging-a-zero-day-vuln...
25
/ 100
low-risk
Severity
19/34 · Moderate
Exploitability
1/34 · Minimal
Exposure
5/34 · Minimal