CWE
312
Advisory Published
Updated

CVE-2023-39210

First published: Tue Aug 08 2023(Updated: )

Cleartext storage of sensitive information in Zoom Client SDK for Windows before 5.15.0 may allow an authenticated user to enable an information disclosure via local access.

Credit: security@zoom.us security@zoom.us

Affected SoftwareAffected VersionHow to fix
Zoom Meeting Software Development Kit<5.15.0

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2023-39210?

    CVE-2023-39210 is a vulnerability that involves the cleartext storage of sensitive information in Zoom Client SDK for Windows.

  • How does CVE-2023-39210 impact users?

    CVE-2023-39210 may allow an authenticated user with local access to enable an information disclosure.

  • Which software versions are affected by CVE-2023-39210?

    CVE-2023-39210 affects Zoom Client SDK for Windows versions before 5.15.0.

  • What is the severity of CVE-2023-39210?

    The severity of CVE-2023-39210 is medium, with a score of 5.5.

  • How can users fix CVE-2023-39210?

    Users should update the Zoom Client SDK for Windows to version 5.15.0 or above to fix CVE-2023-39210.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203