#VU77820 Cleartext transmission of sensitive information in Zoom Video Communications, Inc. Universal components / Libraries


Published: 2023-06-30

Vulnerability identifier: #VU77820

Vulnerability risk: Low

CVSSv3.1: 3.2 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-36539

CWE-ID: CWE-319

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Zoom Client for Windows
Client/Desktop applications / Office applications
Zoom Client for macOS
Client/Desktop applications / Office applications
Zoom Client for Linux
Client/Desktop applications / Office applications
Zoom Rooms for Windows
Client/Desktop applications / Office applications
Zoom Client for iOS
Mobile applications / Apps for mobile phones
Zoom Client for Android
Mobile applications / Apps for mobile phones
Zoom Rooms for macOS
Client/Desktop applications / Messaging software
Zoom Meeting SDK for Windows
Universal components / Libraries / Software for developers

Vendor: Zoom Video Communications, Inc.

Description

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to software did not use a per-meeting key to encrypt messages sent between user devices and Zoom, including messages sent during End-to-End Encrypted (E2EE) meetings.A remote attacker with ability to intercept and decrypt TLS communication can gain access to sensitive information.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Zoom Client for Windows: 5.15.0 17890 - 5.15.1 17948

Zoom Client for macOS: 5.15.0 19644

Zoom Client for Linux: 5.15.0 4063

Zoom Client for iOS: 5.15.0 8765

Zoom Client for Android: 5.15.0 14500

Zoom Rooms for Windows: 5.15.0 2989

Zoom Rooms for macOS: 5.15.0 3588

Zoom Meeting SDK for Windows: 5.15.1


External links
http://explore.zoom.us/en/trust/security/security-bulletin/#ZSB-23025


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability