CVE-2020-11876

airhost.exe in Zoom Client for Meetings 4.6.11 uses the SHA-256 hash of 0123425234234fsdfsdr3242 for initialization of an OpenSSL EVP AES-256 CBC context. NOTE: the vendor states that this initialization only occurs within unreachable code
References
Link Resource
https://dev.io/posts/zoomzoo/ Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:zoom:meetings:4.6.11:*:*:*:*:windows:*:*

History

07 Nov 2023, 03:15

Type Values Removed Values Added
Summary ** DISPUTED ** airhost.exe in Zoom Client for Meetings 4.6.11 uses the SHA-256 hash of 0123425234234fsdfsdr3242 for initialization of an OpenSSL EVP AES-256 CBC context. NOTE: the vendor states that this initialization only occurs within unreachable code. airhost.exe in Zoom Client for Meetings 4.6.11 uses the SHA-256 hash of 0123425234234fsdfsdr3242 for initialization of an OpenSSL EVP AES-256 CBC context. NOTE: the vendor states that this initialization only occurs within unreachable code

03 May 2022, 14:18

Type Values Removed Values Added
CWE CWE-798 CWE-327

Information

Published : 2020-04-17 16:15

Updated : 2024-03-21 02:35


NVD link : CVE-2020-11876

Mitre link : CVE-2020-11876

CVE.ORG link : CVE-2020-11876


JSON object : View

Products Affected

zoom

  • meetings
CWE
CWE-327

Use of a Broken or Risky Cryptographic Algorithm