First published: Wed Dec 13 2023(Updated: )
Path traversal in Zoom Desktop Client for Windows, Zoom VDI Client for Windows, and Zoom SDKs for Windows may allow an authenticated user to conduct an escalation of privilege via network access.
Credit: security@zoom.us
Affected Software | Affected Version | How to fix |
---|---|---|
Zoom Meeting SDK | <5.16.5 | |
Zoom Video Software Development Kit | <5.16.5 | |
Oracle Virtual Desktop Infrastructure | <5.14.14 | |
Oracle Virtual Desktop Infrastructure | >=5.15.0<5.15.12 | |
Zoom | <5.16.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-43586 is rated as a high severity vulnerability due to potential escalation of privilege through path traversal.
To fix CVE-2023-43586, users should update the affected Zoom desktop clients and SDKs to the latest versions provided by Zoom.
CVE-2023-43586 affects Zoom Desktop Client, Zoom VDI Client, and Zoom SDKs for Windows up to specific version limits.
No, CVE-2023-43586 requires an authenticated user to exploit the vulnerability.
The attack vector for CVE-2023-43586 involves network access that exploits path traversal to achieve privilege escalation.