{"id":2064,"date":"2022-06-17T02:47:00","date_gmt":"2022-06-17T02:47:00","guid":{"rendered":"https:\/\/cleanerone.trendmicro.com\/blog\/?p=2064"},"modified":"2022-06-17T02:47:00","modified_gmt":"2022-06-17T02:47:00","slug":"critical-zoom-vulnerabilities-found-how-to-protect-your-zoom-meetings-from-new-zero-day-security-flaws","status":"publish","type":"post","link":"https:\/\/cleanerone.trendmicro.com\/blog\/critical-zoom-vulnerabilities-found-how-to-protect-your-zoom-meetings-from-new-zero-day-security-flaws\/","title":{"rendered":"Critical Zoom Vulnerabilities Found \u2014 How to Protect Your Zoom Meetings from New Zero-Day Security Flaws"},"content":{"rendered":"<p><picture><source srcset=\"https:\/\/cleanerone.trendmicro.com\/blog\/wp-content\/webp-express\/webp-images\/doc-root\/blog\/wp-content\/uploads\/2022\/06\/zoom-vulnerability.jpg.webp\" type=\"image\/webp\"><img decoding=\"async\" src=\"https:\/\/cleanerone.trendmicro.com\/blog\/wp-content\/uploads\/2022\/06\/zoom-vulnerability.jpg\" alt=\"zoom-vulnerability\" class=\"webpexpress-processed\"><\/picture>Google Project Zero researchers have found critical vulnerabilities in Zoom\u2019s client and server. These vulnerabilities enable malicious actors to compromise users over Zoom chat over the  XMPP protocol, according to <a class=\"wp-editor-md-post-content-link\" href=\"https:\/\/bugs.chromium.org\/p\/project-zero\/issues\/detail?id=2254\" title=\"the bug report\" target=\"_blank\" rel=\"noopener\">the bug report<\/a> by Ivan Fratric, a Google Project Zero researcher. Also noteworthy is the fact that it can be done without arousing victims\u2019 suspicions because no input from the victims is required.<\/p>\n<p>According to <a class=\"wp-editor-md-post-content-link\" href=\"https:\/\/www.cvedetails.com\/vulnerability-list\/vendor_id-2159\/Zoom.html\" title=\"CVE Details\" target=\"_blank\" rel=\"noopener\">CVE Details<\/a>, the CVE-2022-22786 vulnerability only affects Zoom clients running on Windows, while the other three (CVE-2022-22784, CVE-2022-22785, and CVE-2022-22787) impact Android, iOS, Linux, macOS, and Windows.<\/p>\n<p>To patch the vulnerabilities, users are advised to update their Zoom clients to version 5.10.0. You can configure your Zoom client to automatically update to the latest version in the settings menu.<\/p>\n<p><picture><source srcset=\"https:\/\/cleanerone.trendmicro.com\/blog\/wp-content\/webp-express\/webp-images\/doc-root\/blog\/wp-content\/uploads\/2022\/06\/zoom-settings-patch-vulnerabilities.png.webp\" type=\"image\/webp\"><img decoding=\"async\" src=\"https:\/\/cleanerone.trendmicro.com\/blog\/wp-content\/uploads\/2022\/06\/zoom-settings-patch-vulnerabilities.png\" alt=\"zoom-settings-patch-vulnerabilities\" class=\"webpexpress-processed\"><\/picture><\/p>\n<p>To make detecting and removing vulnerabilities as easy as possible, it\u2019s worth trying the <strong>Vulnerability Scan<\/strong> feature in Cleaner One Pro. It scans your computer to detect vulnerabilities and suggest remedial actions.<\/p>\n<p>As this is a brand-new feature, if you already have Cleaner One Pro installed, please ensure it is updated to the latest version. For those who haven\u2019t downloaded Cleaner One Pro yet, you can get it for free here: <a class=\"wp-editor-md-post-content-link\" href=\"https:\/\/cleanerone.trendmicro.com\/cleaner-one-pro-for-mac\/\" title=\"Cleaner One Pro for Mac\">Cleaner One Pro for Mac<\/a>, <a class=\"wp-editor-md-post-content-link\" href=\"https:\/\/cleanerone.trendmicro.com\/cleaner-one-pro-for-win\/\" title=\"Cleaner One Pro for Windows\">Cleaner One Pro for Windows<\/a>.<\/p>\n<p>Cleaner One Pro is an all-in-one disk cleaner that declutters your computer and protects it against attacks and vulnerabilities.<\/p>\n<p><picture><source srcset=\"https:\/\/cleanerone.trendmicro.com\/blog\/wp-content\/webp-express\/webp-images\/doc-root\/blog\/wp-content\/uploads\/2022\/06\/cleaner-pne-pro-vulnerability-scan.png.webp\" type=\"image\/webp\"><img decoding=\"async\" src=\"https:\/\/cleanerone.trendmicro.com\/blog\/wp-content\/uploads\/2022\/06\/cleaner-pne-pro-vulnerability-scan.png\" alt=\"cleaner-pne-pro-vulnerability-scan\" class=\"webpexpress-processed\"><\/picture><\/p>\n<p>If you\u2019ve found this article useful, please <strong>SHARE<\/strong> it with your family and friends.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Google Project Zero researchers have found critical vulnerabilities in Zoom\u2019s client and server. These vulnerabilities enable malicious actors to compromise users over Zoom chat over the XMPP protocol, according to the bug report by Ivan Fratric, a Google Project Zero researcher. Also noteworthy is the fact that it can be done without arousing victims\u2019 suspicions because no input from the victims is required. According to CVE Details, the CVE-2022-22786 vulnerability only affects Zoom clients running on Windows, while the other three (CVE-2022-22784, CVE-2022-22785, and CVE-2022-22787) impact Android, iOS, Linux, macOS, and Windows. To patch the vulnerabilities, users are advised to <\/p>\n","protected":false},"author":2,"featured_media":2082,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_locale":"","_original_post":"","footnotes":""},"categories":[1],"tags":[153,398,400,401,399],"class_list":["post-2064","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-howto","tag-cleaner-one-pro","tag-vulnerability","tag-zoom-security","tag-zoom-security-issues","tag-zoom-vulnerability","en-US","has_thumb"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Critical Zoom Vulnerabilities Found \u2014 How to Protect Your Zoom Meetings from New Zero-Day Security Flaws - TrendMicro<\/title>\n<meta name=\"description\" content=\"Google Project Zero researchers have found critical vulnerabilities in Zoom\u2019s client and server. Here are solutions to patch them.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cleanerone.trendmicro.com\/blog\/critical-zoom-vulnerabilities-found-how-to-protect-your-zoom-meetings-from-new-zero-day-security-flaws\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Critical Zoom Vulnerabilities Found \u2014 How to Protect Your Zoom Meetings from New Zero-Day Security Flaws - TrendMicro\" \/>\n<meta property=\"og:description\" content=\"Google Project Zero researchers have found critical vulnerabilities in Zoom\u2019s client and server. Here are solutions to patch them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cleanerone.trendmicro.com\/blog\/critical-zoom-vulnerabilities-found-how-to-protect-your-zoom-meetings-from-new-zero-day-security-flaws\/\" \/>\n<meta property=\"og:site_name\" content=\"Apple &amp; Microsoft News,Tutorials,Security Tips|Cleaner One Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-17T02:47:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cleanerone.trendmicro.com\/blog\/wp-content\/uploads\/2022\/06\/how-to-seucre-your-zoom-meeting.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"493\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Louis.G\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Louis.G\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cleanerone.trendmicro.com\/blog\/critical-zoom-vulnerabilities-found-how-to-protect-your-zoom-meetings-from-new-zero-day-security-flaws\/\",\"url\":\"https:\/\/cleanerone.trendmicro.com\/blog\/critical-zoom-vulnerabilities-found-how-to-protect-your-zoom-meetings-from-new-zero-day-security-flaws\/\",\"name\":\"Critical Zoom Vulnerabilities Found \u2014 How to Protect Your Zoom Meetings from New Zero-Day Security Flaws - TrendMicro\",\"isPartOf\":{\"@id\":\"https:\/\/cleanerone.trendmicro.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cleanerone.trendmicro.com\/blog\/critical-zoom-vulnerabilities-found-how-to-protect-your-zoom-meetings-from-new-zero-day-security-flaws\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cleanerone.trendmicro.com\/blog\/critical-zoom-vulnerabilities-found-how-to-protect-your-zoom-meetings-from-new-zero-day-security-flaws\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cleanerone.trendmicro.com\/blog\/wp-content\/uploads\/2022\/06\/how-to-seucre-your-zoom-meeting.jpg\",\"datePublished\":\"2022-06-17T02:47:00+00:00\",\"dateModified\":\"2022-06-17T02:47:00+00:00\",\"author\":{\"@id\":\"https:\/\/cleanerone.trendmicro.com\/blog\/#\/schema\/person\/5ad5cb6695a57e01a5a55b3d5a2a4adb\"},\"description\":\"Google Project Zero researchers have found critical vulnerabilities in Zoom\u2019s client and server. Here are solutions to patch them.\",\"breadcrumb\":{\"@id\":\"https:\/\/cleanerone.trendmicro.com\/blog\/critical-zoom-vulnerabilities-found-how-to-protect-your-zoom-meetings-from-new-zero-day-security-flaws\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cleanerone.trendmicro.com\/blog\/critical-zoom-vulnerabilities-found-how-to-protect-your-zoom-meetings-from-new-zero-day-security-flaws\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cleanerone.trendmicro.com\/blog\/critical-zoom-vulnerabilities-found-how-to-protect-your-zoom-meetings-from-new-zero-day-security-flaws\/#primaryimage\",\"url\":\"https:\/\/cleanerone.trendmicro.com\/blog\/wp-content\/uploads\/2022\/06\/how-to-seucre-your-zoom-meeting.jpg\",\"contentUrl\":\"https:\/\/cleanerone.trendmicro.com\/blog\/wp-content\/uploads\/2022\/06\/how-to-seucre-your-zoom-meeting.jpg\",\"width\":1280,\"height\":493,\"caption\":\"zoom security issues\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cleanerone.trendmicro.com\/blog\/critical-zoom-vulnerabilities-found-how-to-protect-your-zoom-meetings-from-new-zero-day-security-flaws\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cleanerone.trendmicro.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Critical Zoom Vulnerabilities Found \u2014 How to Protect Your Zoom Meetings from New Zero-Day Security Flaws\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cleanerone.trendmicro.com\/blog\/#website\",\"url\":\"https:\/\/cleanerone.trendmicro.com\/blog\/\",\"name\":\"Apple &amp; Microsoft News,Tutorials,Security Tips|Cleaner One Blog\",\"description\":\"Keep up with latest stories and product updates from Cleaner One. News about technology, software,cybersecurity, and more.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cleanerone.trendmicro.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/cleanerone.trendmicro.com\/blog\/#\/schema\/person\/5ad5cb6695a57e01a5a55b3d5a2a4adb\",\"name\":\"Louis.G\",\"url\":\"https:\/\/cleanerone.trendmicro.com\/blog\/author\/louis-g\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Critical Zoom Vulnerabilities Found \u2014 How to Protect Your Zoom Meetings from New Zero-Day Security Flaws - TrendMicro","description":"Google Project Zero researchers have found critical vulnerabilities in Zoom\u2019s client and server. Here are solutions to patch them.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cleanerone.trendmicro.com\/blog\/critical-zoom-vulnerabilities-found-how-to-protect-your-zoom-meetings-from-new-zero-day-security-flaws\/","og_locale":"en_US","og_type":"article","og_title":"Critical Zoom Vulnerabilities Found \u2014 How to Protect Your Zoom Meetings from New Zero-Day Security Flaws - TrendMicro","og_description":"Google Project Zero researchers have found critical vulnerabilities in Zoom\u2019s client and server. Here are solutions to patch them.","og_url":"https:\/\/cleanerone.trendmicro.com\/blog\/critical-zoom-vulnerabilities-found-how-to-protect-your-zoom-meetings-from-new-zero-day-security-flaws\/","og_site_name":"Apple &amp; Microsoft News,Tutorials,Security Tips|Cleaner One Blog","article_published_time":"2022-06-17T02:47:00+00:00","og_image":[{"width":1280,"height":493,"url":"https:\/\/cleanerone.trendmicro.com\/blog\/wp-content\/uploads\/2022\/06\/how-to-seucre-your-zoom-meeting.jpg","type":"image\/jpeg"}],"author":"Louis.G","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Louis.G","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cleanerone.trendmicro.com\/blog\/critical-zoom-vulnerabilities-found-how-to-protect-your-zoom-meetings-from-new-zero-day-security-flaws\/","url":"https:\/\/cleanerone.trendmicro.com\/blog\/critical-zoom-vulnerabilities-found-how-to-protect-your-zoom-meetings-from-new-zero-day-security-flaws\/","name":"Critical Zoom Vulnerabilities Found \u2014 How to Protect Your Zoom Meetings from New Zero-Day Security Flaws - TrendMicro","isPartOf":{"@id":"https:\/\/cleanerone.trendmicro.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cleanerone.trendmicro.com\/blog\/critical-zoom-vulnerabilities-found-how-to-protect-your-zoom-meetings-from-new-zero-day-security-flaws\/#primaryimage"},"image":{"@id":"https:\/\/cleanerone.trendmicro.com\/blog\/critical-zoom-vulnerabilities-found-how-to-protect-your-zoom-meetings-from-new-zero-day-security-flaws\/#primaryimage"},"thumbnailUrl":"https:\/\/cleanerone.trendmicro.com\/blog\/wp-content\/uploads\/2022\/06\/how-to-seucre-your-zoom-meeting.jpg","datePublished":"2022-06-17T02:47:00+00:00","dateModified":"2022-06-17T02:47:00+00:00","author":{"@id":"https:\/\/cleanerone.trendmicro.com\/blog\/#\/schema\/person\/5ad5cb6695a57e01a5a55b3d5a2a4adb"},"description":"Google Project Zero researchers have found critical vulnerabilities in Zoom\u2019s client and server. Here are solutions to patch them.","breadcrumb":{"@id":"https:\/\/cleanerone.trendmicro.com\/blog\/critical-zoom-vulnerabilities-found-how-to-protect-your-zoom-meetings-from-new-zero-day-security-flaws\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cleanerone.trendmicro.com\/blog\/critical-zoom-vulnerabilities-found-how-to-protect-your-zoom-meetings-from-new-zero-day-security-flaws\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cleanerone.trendmicro.com\/blog\/critical-zoom-vulnerabilities-found-how-to-protect-your-zoom-meetings-from-new-zero-day-security-flaws\/#primaryimage","url":"https:\/\/cleanerone.trendmicro.com\/blog\/wp-content\/uploads\/2022\/06\/how-to-seucre-your-zoom-meeting.jpg","contentUrl":"https:\/\/cleanerone.trendmicro.com\/blog\/wp-content\/uploads\/2022\/06\/how-to-seucre-your-zoom-meeting.jpg","width":1280,"height":493,"caption":"zoom security issues"},{"@type":"BreadcrumbList","@id":"https:\/\/cleanerone.trendmicro.com\/blog\/critical-zoom-vulnerabilities-found-how-to-protect-your-zoom-meetings-from-new-zero-day-security-flaws\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cleanerone.trendmicro.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Critical Zoom Vulnerabilities Found \u2014 How to Protect Your Zoom Meetings from New Zero-Day Security Flaws"}]},{"@type":"WebSite","@id":"https:\/\/cleanerone.trendmicro.com\/blog\/#website","url":"https:\/\/cleanerone.trendmicro.com\/blog\/","name":"Apple &amp; Microsoft News,Tutorials,Security Tips|Cleaner One Blog","description":"Keep up with latest stories and product updates from Cleaner One. News about technology, software,cybersecurity, and more.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cleanerone.trendmicro.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/cleanerone.trendmicro.com\/blog\/#\/schema\/person\/5ad5cb6695a57e01a5a55b3d5a2a4adb","name":"Louis.G","url":"https:\/\/cleanerone.trendmicro.com\/blog\/author\/louis-g\/"}]}},"_links":{"self":[{"href":"https:\/\/cleanerone.trendmicro.com\/blog\/wp-json\/wp\/v2\/posts\/2064","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cleanerone.trendmicro.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cleanerone.trendmicro.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cleanerone.trendmicro.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cleanerone.trendmicro.com\/blog\/wp-json\/wp\/v2\/comments?post=2064"}],"version-history":[{"count":1,"href":"https:\/\/cleanerone.trendmicro.com\/blog\/wp-json\/wp\/v2\/posts\/2064\/revisions"}],"predecessor-version":[{"id":2069,"href":"https:\/\/cleanerone.trendmicro.com\/blog\/wp-json\/wp\/v2\/posts\/2064\/revisions\/2069"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cleanerone.trendmicro.com\/blog\/wp-json\/wp\/v2\/media\/2082"}],"wp:attachment":[{"href":"https:\/\/cleanerone.trendmicro.com\/blog\/wp-json\/wp\/v2\/media?parent=2064"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cleanerone.trendmicro.com\/blog\/wp-json\/wp\/v2\/categories?post=2064"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cleanerone.trendmicro.com\/blog\/wp-json\/wp\/v2\/tags?post=2064"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}