airhost.exe in Zoom Client for Meetings 4.6.11 uses 3423423432325249 as the Initialization Vector (IV) for AES-256 CBC encryption. NOTE: the vendor states that this IV is used only within unreachable code
7.5high severity
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
17/04/2020
Products1
Meetings
by Zoom
415 Versions
2 months ago
Vulnerability Categories2
Inadequate Encryption Strength
Use of Insufficiently Random Values
xTags 4
#easy_to_exploit
#known_vulnerability
#confidentiality_impact_if_exploited
#has_exploit
Advisory Links1
https://dev.io/posts/zoomzoo/
http://www.vicarius.io
is owned and operated by Vicarius Ltd. (the “Company”). All information contained on the
Website is purely for informational, and educational purposes and should be independently
verified and confirmed. Vicarius does not accept any liability for any loss or damage
whatsoever caused in reliance upon such information or services. No statements or information
presented in any form by Vicarius is intended as fact, and you agree that you will not
consider the statements or information presented on the Website as fact or as a guarantee of
performance.
Related CVEs
Security Research Topics
By Vicarius Studios .
Mar 28, 2024
The Easter Patch Hunt ft. Santa and the Three Sysadmins
By David Parkinson Frost
Mar 21, 2024
David Rambles on Copilot and GPU Spies
By The Meme Bot
Mar 14, 2024
By Shivam Bathla
Mar 10, 2024
Unveiling CVE-2024-21501: Pursuing the abyss - Understanding and exploiting sanitize-html vulnerability, patch, and the root-cause!
Versions below 2.12.1 of the package sanitize-html are vulnerable to path disclosure when used on the backend and with the style attribute allowed, allowing verifying files and folder existence on the system (including project dependencies). An attacker could leverage this vulnerability to gather details about the file system structure and dependencies to perform more targeted attacks against the server. This post details the process of diving into the source code to uncover the root-cause and reveal how insecure usage of the third-party package could lead to seemingly innocuous yet noxious bugs.