First published: Tue Nov 14 2023(Updated: )
Improper conditions check in Zoom Team Chat for Zoom clients may allow an authenticated user to conduct a denial of service via network access.
Credit: security@zoom.us
Affected Software | Affected Version | How to fix |
---|---|---|
Zoom Meetings | <5.16.0 | |
Zoom Meetings | <5.16.0 | |
Zoom Meetings | <5.16.0 | |
Zoom Meetings | <5.16.0 | |
Zoom Meetings | <5.16.0 | |
Zoom Video Software Development Kit | <1.9.0 | |
Zoom Video Software Development Kit | <1.9.0 | |
Zoom Video Software Development Kit | <1.9.0 | |
Zoom Video Software Development Kit | <1.9.0 | |
Zoom Video Software Development Kit | <1.9.0 | |
Zoom Virtual Desktop Infrastructure | <5.14.13 | |
Zoom Virtual Desktop Infrastructure | >=5.15.0<5.15.11 | |
Zoom Zoom | <5.16.0 | |
Zoom Zoom | <5.16.0 | |
Zoom Zoom | <5.16.0 | |
Zoom Zoom | <5.16.0 | |
Zoom Zoom | <5.16.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-39205 is a vulnerability that allows an authenticated user to conduct a denial of service attack in Zoom Team Chat.
CVE-2023-39205 affects various Zoom clients, including Zoom Meetings, Zoom Video Software Development Kit, Zoom Virtual Desktop Infrastructure, and Zoom Zoom.
CVE-2023-39205 has a severity rating of 6.5 (medium).
An authenticated user can exploit CVE-2023-39205 by conducting a denial of service attack through network access.
To mitigate CVE-2023-39205, update your Zoom clients to versions 5.16.1 or higher.