First published: Tue Aug 08 2023(Updated: )
Improper input validation in Zoom SDK’s before 5.14.10 may allow an unauthenticated user to enable a denial of service via network access.
Credit: security@zoom.us security@zoom.us
Affected Software | Affected Version | How to fix |
---|---|---|
Zoom Meeting Software Development Kit | <5.14.10 | |
Zoom Meeting Software Development Kit | <5.14.10 | |
Zoom Meeting Software Development Kit | <5.14.10 | |
Zoom Meeting Software Development Kit | <5.14.10 | |
Zoom Meeting Software Development Kit | <5.14.10 | |
Zoom Video Software Development Kit | <5.14.10 | |
Zoom Video Software Development Kit | <5.14.10 | |
Zoom Video Software Development Kit | <5.14.10 | |
Zoom Video Software Development Kit | <5.14.10 | |
Zoom Video Software Development Kit | <5.14.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-39217 is a vulnerability in Zoom SDK’s before version 5.14.10 that allows an unauthenticated user to enable a denial of service via network access.
CVE-2023-39217 has a severity rating of 7.5 (High).
Zoom Meeting Software Development Kit and Zoom Video Software Development Kit versions up to 5.14.10 are affected by CVE-2023-39217.
An unauthenticated user can exploit CVE-2023-39217 by enabling a denial of service via network access.
To fix CVE-2023-39217, Zoom users should update their Zoom SDK to version 5.14.10 or later.