First published: Tue Aug 08 2023(Updated: )
Client-side enforcement of server-side security in Zoom clients before 5.14.10 may allow an authenticated user to enable information disclosure via network access.
Credit: security@zoom.us security@zoom.us
Affected Software | Affected Version | How to fix |
---|---|---|
Zoom Rooms | <5.14.10 | |
Zoom Rooms | <5.14.10 | |
Zoom Rooms | <5.14.10 | |
Zoom Rooms | <5.14.10 | |
Zoom Virtual Desktop Infrastructure | <5.14.10 | |
Zoom Zoom | <5.14.10 | |
Zoom Zoom | <5.14.10 | |
Zoom Zoom | <5.14.10 | |
Zoom Zoom | <5.14.10 | |
Zoom Zoom | <5.14.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-36535 is high with a CVSS score of 6.5.
The affected software of CVE-2023-36535 includes Zoom Rooms (Android, iPad OS, macOS, Windows), Zoom Virtual Desktop Infrastructure, and Zoom (Android, iPhone OS, Linux, macOS, Windows) versions up to exclusive 5.14.10.
An authenticated user can exploit CVE-2023-36535 by enabling information disclosure via network access.
The Common Weakness Enumeration (CWE) for CVE-2023-36535 is CWE-602.
You can find more information about CVE-2023-36535 in the Zoom security bulletin: [Zoom Security Bulletin](https://explore.zoom.us/en/trust/security/security-bulletin/).