Vulnerability Description
An exploitable partial path traversal vulnerability exists in the way Zoom Client version 4.6.10 processes messages including shared code snippets. A specially crafted chat message can cause an arbitrary binary planting which could be abused to achieve arbitrary code execution. An attacker needs to send a specially crafted message to a target user or a group to trigger this vulnerability. For the most severe effect, target user interaction is required.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Zoom | Zoom | 4.6.10 |
Related Weaknesses (CWE)
References
- https://talosintelligence.com/vulnerability_reports/TALOS-2020-1056ExploitThird Party Advisory
- https://talosintelligence.com/vulnerability_reports/TALOS-2020-1056ExploitThird Party Advisory
FAQ
What is CVE-2020-6110?
CVE-2020-6110 is a vulnerability with a CVSS score of 8.8 (HIGH). An exploitable partial path traversal vulnerability exists in the way Zoom Client version 4.6.10 processes messages including shared code snippets. A specially crafted chat message can cause an arbitr...
How severe is CVE-2020-6110?
CVE-2020-6110 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-6110?
Check the references section above for vendor advisories and patch information. Affected products include: Zoom Zoom.