8.3

CVE-2023-28597

Zoom clients prior to 5.13.5 contain an improper trust boundary implementation vulnerability. If a victim saves a local recording to an SMB location and later opens it using a link from Zoom’s web portal, an attacker positioned on an adjacent network to the victim client could set up a malicious SMB server to respond to client requests, causing the client to execute attacker controlled executables. This could result in an attacker gaining access to a user's device and data, and remote code execution.

Data is provided by the National Vulnerability Database (NVD)
ZoomRooms SwPlatformandroid Version < 5.13.5
ZoomRooms SwPlatformiphone_os Version < 5.13.5
ZoomRooms SwPlatformlinux_kernel Version < 5.13.5
ZoomRooms SwPlatformmacos Version < 5.13.5
ZoomRooms SwPlatformwindows Version < 5.13.5
ZoomZoom SwPlatformandroid Version < 5.13.5
ZoomZoom SwPlatformiphone_os Version < 5.13.5
ZoomZoom SwPlatformlinux_kernel Version < 5.13.5
ZoomZoom SwPlatformmacos Version < 5.13.5
ZoomZoom SwPlatformwindows Version < 5.13.5
ZoomVirtual Desktop Infrastructure Version < 5.13.10
   MicrosoftWindows Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.78% 0.726
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7.5 1.6 5.9
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
security@zoom.us 8.3 1.6 6
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
CWE-501 Trust Boundary Violation

The product mixes trusted and untrusted data in the same data structure or structured message.