Zoom Client for Meetings < 5.7.3 Vulnerability (ZSB-21021)

medium Nessus Plugin ID 168820


The remote host has an application installed that is affected by a vulnerability.


The version of Zoom Client for Meetings installed on the remote host is prior to 5.7.3. It is, therefore, affected by a vulnerability as referenced in the ZSB-21021 advisory.

- The Zoom Client for Meetings before version 5.7.3 (for Android, iOS, Linux, macOS, and Windows) contain a server side request forgery vulnerability in the chat's link preview functionality. In versions prior to 5.7.3, if a user were to enable the chat's link preview feature, a malicious actor could trick the user into potentially sending arbitrary HTTP GET requests to URLs that the actor cannot reach directly. Users can help keep themselves secure by applying current updates or downloading the latest Zoom software with all current security updates from https://zoom.us/download. (CVE-2021-34425)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.


Upgrade to Zoom Client for Meetings 5.7.3 or later.

See Also


Plugin Details

Severity: Medium

ID: 168820

File Name: zoom_client_ZSB-21021.nasl

Version: 1.3

Type: local

Agent: windows, macosx, unix

Family: Misc.

Published: 12/15/2022

Updated: 12/16/2022

Supported Sensors: Nessus Agent, Nessus

Risk Information


Risk Factor: Low

Score: 3.0


Risk Factor: Medium

Base Score: 4

Temporal Score: 3

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:N

CVSS Score Source: CVE-2021-34425


Risk Factor: Medium

Base Score: 6.1

Temporal Score: 5.3

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:zoom:zoom, cpe:/a:zoom:meetings

Exploit Ease: No known exploits are available

Patch Publication Date: 12/14/2021

Vulnerability Publication Date: 12/14/2021

Reference Information

CVE: CVE-2021-34425