First published: Thu Mar 16 2023(Updated: )
Zoom clients before version 5.13.5 contain a STUN parsing vulnerability. A malicious actor could send specially crafted UDP traffic to a victim Zoom client to remotely cause the client to crash, causing a denial of service.
Credit: security@zoom.us
Affected Software | Affected Version | How to fix |
---|---|---|
Zoom | <5.13.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-22881 is a STUN parsing vulnerability found in Zoom clients before version 5.13.5.
A malicious actor can exploit CVE-2023-22881 by sending specially crafted UDP traffic to a victim Zoom client, causing it to crash.
CVE-2023-22881 can result in a denial of service (DoS) situation, where the victim Zoom client crashes and becomes unresponsive.
To mitigate CVE-2023-22881, it is recommended to update Zoom clients to version 5.13.5 or later.
You can find more information about CVE-2023-22881 in the official Zoom security bulletin: https://explore.zoom.us/en/trust/security/security-bulletin/