Information disclosure in multiple Zoom products



Published: 2023-06-30
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2023-36539
CWE-ID CWE-319
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Zoom Client for Windows
Client/Desktop applications / Office applications

Zoom Client for macOS
Client/Desktop applications / Office applications

Zoom Client for Linux
Client/Desktop applications / Office applications

Zoom Rooms for Windows
Client/Desktop applications / Office applications

Zoom Client for iOS
Mobile applications / Apps for mobile phones

Zoom Client for Android
Mobile applications / Apps for mobile phones

Zoom Rooms for macOS
Client/Desktop applications / Messaging software

Zoom Meeting SDK for Windows
Universal components / Libraries / Software for developers

Vendor Zoom Video Communications, Inc.

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Cleartext transmission of sensitive information

EUVDB-ID: #VU77820

Risk: Low

CVSSv3.1: 3.2 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-36539

CWE-ID: CWE-319 - Cleartext Transmission of Sensitive Information

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to software did not use a per-meeting key to encrypt messages sent between user devices and Zoom, including messages sent during End-to-End Encrypted (E2EE) meetings.A remote attacker with ability to intercept and decrypt TLS communication can gain access to sensitive information.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Zoom Client for Windows: 5.15.0 17890 - 5.15.1 17948

Zoom Client for macOS: 5.15.0 19644

Zoom Client for Linux: 5.15.0 4063

Zoom Client for iOS: 5.15.0 8765

Zoom Client for Android: 5.15.0 14500

Zoom Rooms for Windows: 5.15.0 2989

Zoom Rooms for macOS: 5.15.0 3588

Zoom Meeting SDK for Windows: 5.15.1

External links

http://explore.zoom.us/en/trust/security/security-bulletin/#ZSB-23025


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website or open a file.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###