Zoom clients prior to 5.13.5 contain an improper trust boundary implementation vulnerability. If a victim saves a local recording to an SMB location and later opens it using a link from Zoom’s web portal, an attacker positioned on an adjacent network to the victim client could set up a malicious SMB server to respond to client requests, causing the client to execute attacker controlled executables. This could result in an attacker gaining access to a user's device and data, and remote code execution.
References
Link | Resource |
---|---|
https://explore.zoom.us/en/trust/security/security-bulletin/ | Vendor Advisory |
https://explore.zoom.us/en/trust/security/security-bulletin/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
AND |
|
History
21 Nov 2024, 07:55
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.3 |
References | () https://explore.zoom.us/en/trust/security/security-bulletin/ - Vendor Advisory |
Information
Published : 2023-03-27 21:15
Updated : 2024-11-21 07:55
NVD link : CVE-2023-28597
Mitre link : CVE-2023-28597
CVE.ORG link : CVE-2023-28597
JSON object : View
Products Affected
zoom
- zoom
- rooms
- virtual_desktop_infrastructure
microsoft
- windows
CWE