Zoom has released security patches for 6 high and 1 low severity vulnerabilities, allowing threat actors to escalate privileges and disclose sensitive information.
The CVSS Score of these vulnerabilities ranges between 3.3 (low) and 8.4 (High).
Title | CVE ID | Severity |
Improper Access Control | CVE-2023-36538 | High |
Improper Privilege Management | CVE-2023-36537 | High |
Untrusted Search Path | CVE-2023-36536 | High |
Insecure Temporary File | CVE-2023-34119 | High |
Improper Privilege Management | CVE-2023-34118 | High |
Relative Path Traversal | CVE-2023-34117 | Low |
Improper Input Validation | CVE-2023-34116 | High |
This vulnerability exists due to improper access control on Zoom rooms in Zoom versions lower than 5.15.0, allowing an authenticated user to escalate privileges via local access.
This vulnerability exists due to an untrusted search path in the installer of Zoom rooms prior to version 5.15.0 which allows an authenticated user to escalate privileges via local access.
This vulnerability exists due to an insecure file on the installer of Zoom rooms versions prior to 5.15.0, allowing an authenticated user to escalate privileges via local access.
This vulnerability exists due to improper input validation in Zoom Desktop for Windows versions prior to 5.15.0, allowing an authenticated user to escalate privileges via local access.
The vulnerabilities are discovered and reported to Zoom by sim0nsecurity.
The above-mentioned are four of the highest-severity vulnerabilities that have been fixed by Zoom and necessary patches have been released.
For more information on the patches, Zoom has released a security advisory for these vulnerabilities. Users are recommended to upgrade their Zoom versions to fix these vulnerabilities.
The post Zoom Security Flaws let Attackers Escalate Privileges appeared first on Cyber Security News.