The popular video conferencing software Zoom has security issues with its desktop and mobile apps that could allow for privilege escalation.
An attacker may be able to obtain elevated privileges within the application or the operating system by exploiting this vulnerability.
A privilege escalation attack is an attempt to obtain unauthorized access to higher rights, permissions, privileges, or entitlements than those allocated to a particular account, user, or device.
This can occur as a result of a system flaw, misconfiguration, or inadequate access controls.
Cryptographic issues, having a CVSS rating of 4.9, are the medium-severity vulnerabilities tracked as CVE-2023-43583.
This is a high-severity flaw tracked as CVE-2023-43585, which has a CVSS rating of 7.1.
The Zoom Mobile App for iOS and Zoom SDKs for iOS may have improper access control, enabling an authenticated user to disclose information through network access.
With a CVSS rating of 7.3, this high-severity bug has been identified as CVE-2023-43586.
An authorized user may be able to carry out an escalation of privilege via network access in Zoom Desktop Client for Windows, Zoom VDI Client for Windows, and Zoom SDKs for Windows using path traversal.
With a CVSS rating of 7.3, this bug is classified as High severity and is tracked as CVE-2023-36540.
Before Zoom Desktop Client version 5.14.5 for Windows, an authenticated user may have been able to enable an escalation of privilege via local access by using an untrusted search path in the installer.
With a CVSS rating of 8, this bug is classified as High severity and is tracked as CVE-2023-36541.
Before Zoom Desktop Client for Windows version 5.14.5, there was insufficient data authenticity verification, which could have enabled an escalation of privilege via network access for an authenticated user.
With a 9.3 CVSS rating, this critical severity flaw is listed as CVE-2023-36534.
Before Zoom Desktop Client for Windows version 5.14.7, path traversal could have enabled an escalation of privilege via network access for an unauthorized user.
This vulnerability, identified as CVE-2023-39216, has a critical severity and a 9.6 CVSS rating.
Before Zoom Desktop Client for Windows version 5.14.7, improper input validation could have enabled an escalation of privilege via network access for an unauthorized user.
This vulnerability, identified as CVE-2023-39213, has a critical severity and a 9.6 CVSS rating.
An unauthenticated user may be able to enable an escalation of privilege via network access due to improper neutralization of special elements in Zoom Desktop Client for Windows and Zoom VDI Client.
Users are urged to maintain their security by installing the most recent updates or getting the most recent version of Zoom software, including all security updates.
This Cyber News was published on cybersecuritynews.com. Publication date: Thu, 14 Dec 2023 13:55:25 +0000