CVE-2022-22787 Overview
The Zoom Client for Meetings across all major platforms (Android, iOS, Linux, macOS, and Windows) before version 5.10.0 contains an improper certificate validation vulnerability (CWE-295). The client fails to properly validate the hostname during a server switch request, which could allow attackers to redirect users to malicious servers when attempting to use Zoom services.
Critical Impact
This vulnerability could enable sophisticated man-in-the-middle attacks where users are tricked into connecting to attacker-controlled servers, potentially exposing meeting credentials, communications, and enabling further exploitation chains including remote code execution.
Affected Products
- Zoom Meetings for Android (versions prior to 5.10.0)
- Zoom Meetings for iOS (versions prior to 5.10.0)
- Zoom Meetings for Linux (versions prior to 5.10.0)
- Zoom Meetings for macOS (versions prior to 5.10.0)
- Zoom Meetings for Windows (versions prior to 5.10.0)
Discovery Timeline
- May 18, 2022 - CVE-2022-22787 published to NVD
- November 21, 2024 - Last updated in NVD database
Technical Details for CVE-2022-22787
Vulnerability Analysis
This vulnerability represents an improper certificate validation flaw within the Zoom Client for Meetings. The core issue lies in the client's failure to properly verify hostnames during server switch operations. When a Zoom client receives a request to switch to a different server—a common operation during load balancing, failover scenarios, or meeting routing—the validation mechanism does not adequately verify that the target server's hostname matches expected trusted domains.
The weakness allows attackers positioned on the network to potentially intercept server switch requests and redirect users to malicious infrastructure. This could be leveraged as part of a more sophisticated attack chain, as documented in related research on XMPP stanza smuggling that could lead to remote code execution scenarios.
Root Cause
The root cause stems from CWE-295: Improper Certificate Validation. The Zoom client's server switching mechanism does not enforce strict hostname verification, allowing the client to accept connections to servers that may not be legitimate Zoom infrastructure. This represents a fundamental failure in the trust establishment process during server redirection operations.
Attack Vector
The attack requires network-level access to intercept communications between the Zoom client and Zoom's infrastructure. An attacker would need to:
- Position themselves to intercept traffic between the victim and Zoom servers (through techniques such as ARP spoofing, DNS hijacking, or compromised network infrastructure)
- Trigger or wait for a server switch request
- Manipulate the response to redirect the client to an attacker-controlled server
- Exploit the established connection for credential theft, session hijacking, or further attacks
The vulnerability's exploitation complexity is high (AC:H) due to the requirement for network positioning and timing, though no user interaction is required once the attacker is positioned. Technical details regarding exploitation through XMPP stanza smuggling are available in the Packet Storm Remote Code Execution advisory.
Detection Methods for CVE-2022-22787
Indicators of Compromise
- Zoom client connections to IP addresses or domains not associated with legitimate Zoom infrastructure
- Unexpected TLS certificate warnings or errors during Zoom session establishment
- Network traffic showing server switch requests followed by connections to non-Zoom hosts
- Anomalous XMPP traffic patterns in Zoom communications
Detection Strategies
- Monitor network traffic for Zoom clients connecting to unauthorized server addresses
- Implement TLS inspection at network boundaries to detect certificate anomalies
- Deploy endpoint detection rules to identify Zoom client versions below 5.10.0
- Analyze DNS queries from Zoom clients for suspicious domain resolutions
Monitoring Recommendations
- Maintain an inventory of all installed Zoom client versions across the organization
- Configure network monitoring to alert on Zoom traffic to non-standard destinations
- Implement SIEM rules to correlate Zoom application events with network connection anomalies
- Review Zoom client logs for server switching events and validate destination servers
How to Mitigate CVE-2022-22787
Immediate Actions Required
- Update all Zoom Client for Meetings installations to version 5.10.0 or later immediately
- Audit all endpoints to identify vulnerable Zoom client versions across the organization
- Consider temporarily restricting Zoom usage on untrusted networks until patches are deployed
- Enable network-level protections to prevent man-in-the-middle attacks
Patch Information
Zoom has addressed this vulnerability in version 5.10.0 and later of the Zoom Client for Meetings. Organizations should update all affected clients across Android, iOS, Linux, macOS, and Windows platforms. Refer to the Zoom Security Bulletin for official patch information and additional security guidance.
Workarounds
- Use Zoom Web Client as a temporary alternative until desktop/mobile clients are updated
- Implement network segmentation to isolate Zoom traffic and reduce attack surface
- Deploy network intrusion detection systems to monitor for suspicious server switch attempts
- Enforce VPN usage for Zoom communications on untrusted networks to add an additional layer of encryption
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


