Cyber Posture

CVE-2024-45421

High

Published: 25 February 2025

Published
25 February 2025
Modified
05 March 2025
KEV Added
Patch
CVSS Score 8.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0069 72.0th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-45421 is a high-severity Heap-based Buffer Overflow (CWE-122) vulnerability in Zoom Meeting Software Development Kit. Its CVSS base score is 8.5 (High).

Operationally, ranked in the top 28.0% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).

Threat & Defense at a Glance

What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Flaw remediation mandates timely patching of the buffer overflow vulnerability as specified in Zoom's security bulletin ZSB-24043.

prevent

Memory protection implements safeguards like ASLR and DEP to block code execution from buffer overflow exploits.

prevent

Information input validation restricts malformed network inputs that could trigger the buffer overflow.

NVD Description

Buffer overflow in some Zoom Apps may allow an authenticated user to conduct an escalation of privilege via network access.

Deeper analysisAI

CVE-2024-45421 is a buffer overflow vulnerability, associated with CWE-122 and CWE-119, affecting some Zoom Apps. Published on 2025-02-25T20:15:35.400, it carries a CVSS v3.1 base score of 8.5 (AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H), indicating high severity due to network accessibility, low privilege requirements, no user interaction, and scope change with high impacts on confidentiality, integrity, and availability.

An authenticated user with low privileges (PR:L) can exploit this vulnerability over the network (AV:N), despite high attack complexity (AC:H). Successful exploitation enables escalation of privilege, potentially allowing the attacker to achieve high-level impacts on confidentiality, integrity, and availability within a changed scope (S:C).

Zoom's security bulletin ZSB-24043, available at https://www.zoom.com/en/trust/security-bulletin/zsb-24043/, provides further details on the vulnerability and associated mitigations or patches.

Details

CWE(s)

Affected Products

zoom
meeting software development kit
≤ 6.2.0 · ≤ 6.2.0 · ≤ 6.2.0
zoom
rooms
≤ 6.2.0 · ≤ 6.2.0 · ≤ 6.2.0
zoom
rooms controller
≤ 6.2.0 · ≤ 6.2.0 · ≤ 6.2.0
zoom
video software development kit
≤ 6.2.0 · ≤ 6.2.0 · ≤ 6.2.0
zoom
workplace
≤ 6.2.0 · ≤ 6.2.0
zoom
workplace desktop
≤ 6.2.0 · ≤ 6.2.0 · ≤ 6.2.0
zoom
workplace virtual desktop infrastructure
≤ 6.1.12

CVEs Like This One

CVE-2025-0151Same product: Zoom Meeting Software Development Kit
CVE-2024-45424Same product: Zoom Meeting Software Development Kit
CVE-2025-0145Same product: Zoom Meeting Software Development Kit
CVE-2025-27439Same product: Zoom Meeting Software Development Kit
CVE-2025-27440Same product: Zoom Meeting Software Development Kit
CVE-2025-0149Same product: Zoom Meeting Software Development Kit
CVE-2025-49457Same product: Zoom Meeting Software Development Kit
CVE-2024-45418Same product: Zoom Meeting Software Development Kit
CVE-2025-0147Same product: Zoom Meeting Software Development Kit
CVE-2025-0150Same product: Zoom Meeting Software Development Kit

References