SB2023061225 - Multiple vulnerabilities in Zoom client for Windows
Published: June 12, 2023
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 6 secuirty vulnerabilities.
1) Exposure of Resource to Wrong Sphere (CVE-ID: CVE-2023-34114)
The vulnerability allows a remote user to gain access to sensitive information.
The vulnerability exists due to improper access restrictions. A remote user can gain access to sensitive information.
2) Input validation error (CVE-ID: CVE-2023-34121)
The vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can gain access to sensitive information.
3) Improper privilege management (CVE-ID: CVE-2023-34120)
The vulnerability allows a local user to escalate privileges.
The vulnerability exists due to improper privilege management. A local user can utilize higher level system privileges maintained by the Zoom client to spawn processes with escalated privileges.
4) Insufficient verification of data authenticity (CVE-ID: CVE-2023-34113)
The vulnerability allows a remote attacker to compromise the affected system.
The vulnerability exists due to insufficient verification of data authenticity. A remote attacker can execute arbitrary code on the target system.
5) Input validation error (CVE-ID: CVE-2023-34122)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to insufficient validation of user-supplied input. A local user can escalate privileges on the system.
6) Buffer overflow (CVE-ID: CVE-2023-28601)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary. A remote attacker can trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
Install update from vendor's website.
References
- https://explore.zoom.us/en/trust/security/security-bulletin/#ZSB-23016
- https://explore.zoom.us/en/trust/security/security-bulletin/#ZSB-23013
- https://explore.zoom.us/en/trust/security/security-bulletin/#ZSB-23012
- https://explore.zoom.us/en/trust/security/security-bulletin/#ZSB-23015
- https://explore.zoom.us/en/trust/security/security-bulletin/#ZSB-23014
- https://explore.zoom.us/en/trust/security/security-bulletin/#ZSB-23009