First published: Mon Mar 27 2023(Updated: )
Zoom clients prior to 5.13.5 contain an improper trust boundary implementation vulnerability. If a victim saves a local recording to an SMB location and later opens it using a link from Zoom’s web portal, an attacker positioned on an adjacent network to the victim client could set up a malicious SMB server to respond to client requests, causing the client to execute attacker controlled executables. This could result in an attacker gaining access to a user's device and data, and remote code execution.
Credit: security@zoom.us
Affected Software | Affected Version | How to fix |
---|---|---|
Zoom Rooms | <5.13.5 | |
Zoom Rooms | <5.13.5 | |
Zoom Rooms | <5.13.5 | |
Zoom Rooms | <5.13.5 | |
Zoom Rooms | <5.13.5 | |
Zoom Zoom | <5.13.5 | |
Zoom Zoom | <5.13.5 | |
Zoom Zoom | <5.13.5 | |
Zoom Zoom | <5.13.5 | |
Zoom Zoom | <5.13.5 | |
Zoom Virtual Desktop Infrastructure | <5.13.10 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Zoom vulnerability is CVE-2023-28597.
The severity of CVE-2023-28597 is high with a severity value of 7.5.
Zoom clients prior to version 5.13.5 are affected by CVE-2023-28597.
If a victim saves a local recording to an SMB location and later opens it using a link from Zoom’s web portal, an attacker positioned on an adjacent network to the victim client could set up a malicious SMB.
You can find more information about CVE-2023-28597 on the Zoom security bulletin page: https://explore.zoom.us/en/trust/security/security-bulletin/