First published: Fri Jan 12 2024(Updated: )
Improper access control in Zoom Desktop Client for Windows, Zoom VDI Client for Windows, and Zoom SDKs for Windows before version 5.16.10 may allow an authenticated user to conduct an escalation of privilege via local access.
Credit: security@zoom.us
Affected Software | Affected Version | How to fix |
---|---|---|
Zoom Meeting SDK | <5.16.10 | |
Zoom Video Software Development Kit | <5.16.10 | |
Zoom | <5.16.10 | |
All of | ||
Any of | ||
Oracle Virtual Desktop Infrastructure | <5.14.14 | |
Oracle Virtual Desktop Infrastructure | >=5.15.0<5.15.12 | |
Oracle Virtual Desktop Infrastructure | >=5.16.0<5.16.10 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-49647 has been classified as a moderate severity vulnerability due to its potential for privilege escalation.
To mitigate CVE-2023-49647, update the Zoom Desktop Client, Zoom VDI Client, or Zoom SDKs to version 5.16.10 or later.
CVE-2023-49647 affects users of the Zoom Desktop Client, Zoom VDI Client, and Zoom SDKs for Windows prior to version 5.16.10.
CVE-2023-49647 can be exploited by an authenticated user to escalate privileges via local access.
CVE-2023-49647 was disclosed in late 2023, prompting immediate attention from affected users.