{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-08T01:41:51.834","vulnerabilities":[{"cve":{"id":"CVE-2022-22785","sourceIdentifier":"security@zoom.us","published":"2022-05-18T16:15:08.697","lastModified":"2024-11-21T06:47:26.770","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Zoom Client for Meetings (for Android, iOS, Linux, MacOS, and Windows) before version 5.10.0 failed to properly constrain client session cookies to Zoom domains. This issue could be used in a more sophisticated attack to send an unsuspecting users Zoom-scoped session cookies to a non-Zoom domain. This could potentially allow for spoofing of a Zoom user."},{"lang":"es","value":"Zoom Client for Meetings (para Android, iOS, Linux, MacOS y Windows) versiones anteriores a 5.10.0, no restringe apropiadamente las cookies de sesión del cliente a los dominios de Zoom. Este problema podría ser usado en un ataque más sofisticado para enviar a un usuario desprevenido las cookies de sesión de Zoom a un dominio que no es de Zoom. Esto podría permitir la suplantación de un usuario de Zoom"}],"metrics":{"cvssMetricV31":[{"source":"security@zoom.us","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:L","baseScore":5.9,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"LOW"},"exploitabilityScore":1.6,"impactScore":4.2},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N","baseScore":9.1,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":5.2}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:N","baseScore":6.4,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-565"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:zoom:meetings:*:*:*:*:*:android:*:*","versionEndExcluding":"5.10.0","matchCriteriaId":"257325E7-C897-49A8-8F82-7AF256A356C5"},{"vulnerable":true,"criteria":"cpe:2.3:a:zoom:meetings:*:*:*:*:*:iphone_os:*:*","versionEndExcluding":"5.10.0","matchCriteriaId":"E22CE428-4C2A-4D98-A05C-0DC947511A82"},{"vulnerable":true,"criteria":"cpe:2.3:a:zoom:meetings:*:*:*:*:*:linux:*:*","versionEndExcluding":"5.10.0","matchCriteriaId":"BB3D750A-6070-43B9-8D2F-0BF840FAEAAE"},{"vulnerable":true,"criteria":"cpe:2.3:a:zoom:meetings:*:*:*:*:*:macos:*:*","versionEndExcluding":"5.10.0","matchCriteriaId":"AD42820E-D045-4AE0-8A35-9B4E3007B71A"},{"vulnerable":true,"criteria":"cpe:2.3:a:zoom:meetings:*:*:*:*:*:windows:*:*","versionEndExcluding":"5.10.0","matchCriteriaId":"DDF53A4B-7533-4DDA-9BEF-C803127FEDDD"}]}]}],"references":[{"url":"https://explore.zoom.us/en/trust/security/security-bulletin","source":"security@zoom.us","tags":["Vendor Advisory"]},{"url":"https://explore.zoom.us/en/trust/security/security-bulletin","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}