The Google Task Zero researcher found a bug in XML parsing on the Zoom customer and server.
Zoom patched a medium-severity flaw, advising Windows, macOS, iOS and Android end users to update their shopper program to version 5.10..
The Google Project Zero security researcher Ivan Fratric mentioned in a report that an attacker can exploit a victim’s equipment about a zoom chat. The bug, tracked as CVE-2022-22787, has a CVSS severity score of 5.9.

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.
Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).
➤ Activate Your Coupon Code
“User interaction is not required for a productive attack. The only means an attacker needs is to be in a position to send out messages to the sufferer in excess of Zoom chat above XMPP protocol,” Ivan described.
So called zero-click on attacks do not demand buyers get any action and are specifically strong specified even the most tech-savvy of end users can fall prey to them.
XMPP stands for Extensible Messaging Existence Protocol and is applied to deliver XML components called stanzas around a stream connection to trade messages and existence details in authentic-time. This messaging protocol is used by Zoom for its chat performance.
In a security bulletin printed by Zoom, the CVE-2022-22786 (CVSS rating 7.5) influences the Windows users, even though the other CVE-2022-22784, CVE-2022-22785, and CVE-2022-22787 impacted Zoom consumer variations in advance of 5.10. managing on Android, iOS, Linux, macOS, and Windows techniques.
Working of Bug
The original vulnerability described by Ivan as “XMPP stanza smuggling” abuses the parsing inconsistencies between XML parser in Zoom customer and server computer software to “smuggle” arbitrary XMPP stanzas to the sufferer machine.
An attacker sending a specially crafted manage stanza can pressure the target client to connect with a malicious server therefore primary to a assortment of attacks from spoofing messages to sending regulate messages.
Ivan famous that “the most impactful vector” in XMPP stanza smuggling vulnerability is an exploit of “ClusterSwitch task in the Zoom shopper, with an attacker-managed “web domain” as a parameter”.
Some components of this report are sourced from:
threatpost.com