First published: Wed Dec 13 2023(Updated: )
Improper authentication in some Zoom clients before version 5.16.5 may allow an authenticated user to conduct a denial of service via network access.
Credit: security@zoom.us
Affected Software | Affected Version | How to fix |
---|---|---|
Zoom Meeting SDK | <5.16.5 | |
Zoom Video Software Development Kit | <5.16.5 | |
Oracle Virtual Desktop Infrastructure | <5.14.14 | |
Oracle Virtual Desktop Infrastructure | >=5.15.0<5.15.12 | |
Zoom | <5.16.5 | |
Zoom | <5.16.5 | |
Zoom Zoom Linux kernel | <5.16.5 | |
Zoom | <5.16.5 | |
Zoom | <5.16.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-49646 has been classified as a medium severity vulnerability.
To fix CVE-2023-49646, upgrade your Zoom client to version 5.16.5 or later.
CVE-2023-49646 impacts various Zoom clients, including Meeting SDK, Video SDK, and different platforms like Android and Windows, all prior to version 5.16.5.
Yes, CVE-2023-49646 can be exploited via network access by an authenticated user.
CVE-2023-49646 may allow an authenticated user to conduct a denial of service attack.