First published: Tue Jun 13 2023(Updated: )
Improper privilege management in Zoom for Windows, Zoom Rooms for Windows, and Zoom VDI for Windows clients before 5.14.0 may allow an authenticated user to potentially enable an escalation of privilege via local access. Users may potentially utilize higher level system privileges maintained by the Zoom client to spawn processes with escalated privileges.
Credit: security@zoom.us security@zoom.us
Affected Software | Affected Version | How to fix |
---|---|---|
Zoom Virtual Desktop Infrastructure | <5.14.0 | |
Microsoft Windows | ||
All of | ||
Zoom Virtual Desktop Infrastructure | <5.14.0 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-34120
The severity of CVE-2023-34120 is high with a CVSS score of 7.8.
Zoom Virtual Desktop Infrastructure versions up to and excluding 5.14.0 are affected by CVE-2023-34120.
Due to improper privilege management, an authenticated user could potentially enable an escalation of privilege via local access in Zoom for Windows, Zoom Rooms for Windows, and Zoom VDI for Windows clients.
No, Microsoft Windows is not affected by CVE-2023-34120.
To fix CVE-2023-34120, users should update Zoom Virtual Desktop Infrastructure to version 5.14.0 or higher.
More information about CVE-2023-34120 can be found in the Zoom security bulletin: https://explore.zoom.us/en/trust/security/security-bulletin/