{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-10T09:52:53.387","vulnerabilities":[{"cve":{"id":"CVE-2024-24690","sourceIdentifier":"security@zoom.us","published":"2024-02-14T00:15:47.000","lastModified":"2024-11-21T08:59:30.693","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Improper input validation in some Zoom clients may allow an authenticated user to conduct a denial of service via network access."},{"lang":"es","value":"Una validación de entrada incorrecta en algunos clientes de Zoom puede permitir que un usuario autenticado realice una denegación de servicio a través del acceso a la red."}],"metrics":{"cvssMetricV31":[{"source":"security@zoom.us","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":2.8,"impactScore":2.5},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":3.6}]},"weaknesses":[{"source":"security@zoom.us","type":"Secondary","description":[{"lang":"en","value":"CWE-1284"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-1284"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:windows:*:*","versionEndExcluding":"5.16.5","matchCriteriaId":"B72243E4-AFF7-4A69-934A-1170A6EDAE0F"},{"vulnerable":true,"criteria":"cpe:2.3:a:zoom:rooms:*:*:*:*:*:*:*:*","versionEndExcluding":"5.17.0","matchCriteriaId":"61CCEE1E-F3C0-41EB-8DF2-4D3EA8600166"},{"vulnerable":true,"criteria":"cpe:2.3:a:zoom:vdi_windows_meeting_clients:*:*:*:*:*:windows:*:*","versionEndExcluding":"5.14.14","matchCriteriaId":"DEC61EA8-8A9D-4E36-9B46-2B45ED1C5DB8"},{"vulnerable":true,"criteria":"cpe:2.3:a:zoom:vdi_windows_meeting_clients:*:*:*:*:*:windows:*:*","versionStartExcluding":"5.14.14","versionEndExcluding":"5.15.12","matchCriteriaId":"390DFFB5-7BEA-41F2-B2E1-F0FED3766C1E"},{"vulnerable":true,"criteria":"cpe:2.3:a:zoom:vdi_windows_meeting_clients:*:*:*:*:*:windows:*:*","versionStartExcluding":"5.15.12","versionEndExcluding":"5.16.10","matchCriteriaId":"8B90CC0C-8000-44E1-8AA1-5E67081ECD2E"},{"vulnerable":true,"criteria":"cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:windows:*:*","versionEndExcluding":"5.16.5","matchCriteriaId":"F58AB464-C80F-4E2B-9F13-BE9B19E3B5BE"},{"vulnerable":true,"criteria":"cpe:2.3:a:zoom:zoom:*:*:*:*:*:android:*:*","versionEndExcluding":"5.16.5","matchCriteriaId":"F0EA451C-C4DC-48EF-A036-3EEA3E3ADD80"},{"vulnerable":true,"criteria":"cpe:2.3:a:zoom:zoom:*:*:*:*:*:iphone_os:*:*","versionEndExcluding":"5.16.5","matchCriteriaId":"C2BF4129-CA54-4ECB-9A6B-EC28445233DF"},{"vulnerable":true,"criteria":"cpe:2.3:a:zoom:zoom:*:*:*:*:*:linux:*:*","versionEndExcluding":"5.16.5","matchCriteriaId":"AD4CD81C-1F22-45CA-8AB1-D6D59E819759"},{"vulnerable":true,"criteria":"cpe:2.3:a:zoom:zoom:*:*:*:*:*:macos:*:*","versionEndExcluding":"5.16.5","matchCriteriaId":"BB9276FF-17D3-4FDB-91BB-2CE6E8BA61A0"},{"vulnerable":true,"criteria":"cpe:2.3:a:zoom:zoom:*:*:*:*:*:windows:*:*","versionEndExcluding":"5.16.5","matchCriteriaId":"19B08EB3-7EBF-416F-91B9-4600E47567F7"}]}]}],"references":[{"url":"https://www.zoom.com/en/trust/security-bulletin/ZSB-24007/","source":"security@zoom.us","tags":["Vendor Advisory"]},{"url":"https://www.zoom.com/en/trust/security-bulletin/ZSB-24007/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}