Show plain JSON{"containers": {"cna": {"affected": [{"product": "Zoom Client for Meetings for Android", "vendor": "Zoom Video Communications Inc", "versions": [{"lessThan": "5.10.0", "status": "affected", "version": "unspecified", "versionType": "custom"}]}, {"product": "Zoom Client for Meetings for iOS", "vendor": "Zoom Video Communications Inc", "versions": [{"lessThan": "5.10.0", "status": "affected", "version": "unspecified", "versionType": "custom"}]}, {"product": "Zoom Client for Meetings for Linux", "vendor": "Zoom Video Communications Inc", "versions": [{"lessThan": "5.10.0", "status": "affected", "version": "unspecified", "versionType": "custom"}]}, {"product": "Zoom Client for Meetings for MacOS", "vendor": "Zoom Video Communications Inc", "versions": [{"lessThan": "5.10.0", "status": "affected", "version": "unspecified", "versionType": "custom"}]}, {"product": "Zoom Client for Meetings for Windows", "vendor": "Zoom Video Communications Inc", "versions": [{"lessThan": "5.10.0", "status": "affected", "version": "unspecified", "versionType": "custom"}]}], "credits": [{"lang": "en", "value": "Ivan Fratric of Google Project Zero"}], "datePublic": "2022-05-17T00:00:00", "descriptions": [{"lang": "en", "value": "The Zoom Client for Meetings (for Android, iOS, Linux, MacOS, and Windows) before version 5.10.0 failed to properly constrain client session cookies to Zoom domains. This issue could be used in a more sophisticated attack to send an unsuspecting users Zoom-scoped session cookies to a non-Zoom domain. This could potentially allow for spoofing of a Zoom user."}], "metrics": [{"cvssV3_1": {"attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:L", "version": "3.1"}}], "problemTypes": [{"descriptions": [{"description": "Exposure of Resource to Wrong Sphere", "lang": "en", "type": "text"}]}], "providerMetadata": {"dateUpdated": "2022-05-18T15:42:19", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom"}, "references": [{"tags": ["x_refsource_MISC"], "url": "https://explore.zoom.us/en/trust/security/security-bulletin"}], "source": {"discovery": "USER"}, "title": "Improperly constrained session cookies in Zoom Client for Meetings", "x_legacyV4Record": {"CVE_data_meta": {"AKA": "Zoom Video Communications Inc", "ASSIGNER": "security@zoom.us", "DATE_PUBLIC": "2022-05-17T12:00:00.000Z", "ID": "CVE-2022-22785", "STATE": "PUBLIC", "TITLE": "Improperly constrained session cookies in Zoom Client for Meetings"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "Zoom Client for Meetings for Android", "version": {"version_data": [{"version_affected": "<", "version_value": "5.10.0"}]}}, {"product_name": "Zoom Client for Meetings for iOS", "version": {"version_data": [{"version_affected": "<", "version_value": "5.10.0"}]}}, {"product_name": "Zoom Client for Meetings for Linux", "version": {"version_data": [{"version_affected": "<", "version_value": "5.10.0"}]}}, {"product_name": "Zoom Client for Meetings for MacOS", "version": {"version_data": [{"version_affected": "<", "version_value": "5.10.0"}]}}, {"product_name": "Zoom Client for Meetings for Windows", "version": {"version_data": [{"version_affected": "<", "version_value": "5.10.0"}]}}]}, "vendor_name": "Zoom Video Communications Inc"}]}}, "credit": [{"lang": "eng", "value": "Ivan Fratric of Google Project Zero"}], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "The Zoom Client for Meetings (for Android, iOS, Linux, MacOS, and Windows) before version 5.10.0 failed to properly constrain client session cookies to Zoom domains. This issue could be used in a more sophisticated attack to send an unsuspecting users Zoom-scoped session cookies to a non-Zoom domain. This could potentially allow for spoofing of a Zoom user."}]}, "impact": {"cvss": {"attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:L", "version": "3.1"}}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "Exposure of Resource to Wrong Sphere"}]}]}, "references": {"reference_data": [{"name": "https://explore.zoom.us/en/trust/security/security-bulletin", "refsource": "MISC", "url": "https://explore.zoom.us/en/trust/security/security-bulletin"}]}, "source": {"discovery": "USER"}}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-03T03:21:49.145Z"}, "title": "CVE Program Container", "references": [{"tags": ["x_refsource_MISC", "x_transferred"], "url": "https://explore.zoom.us/en/trust/security/security-bulletin"}]}]}, "cveMetadata": {"assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2022-22785", "datePublished": "2022-05-18T15:42:19.156563Z", "dateReserved": "2022-01-07T00:00:00", "dateUpdated": "2024-09-17T02:41:15.335Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}