8.3
CVE-2023-28597
- EPSS 0.78%
- Published 27.03.2023 21:15:12
- Last modified 19.02.2025 16:15:37
- Source security@zoom.us
- Teams watchlist Login
- Open Login
Zoom clients prior to 5.13.5 contain an improper trust boundary implementation vulnerability. If a victim saves a local recording to an SMB location and later opens it using a link from Zoom’s web portal, an attacker positioned on an adjacent network to the victim client could set up a malicious SMB server to respond to client requests, causing the client to execute attacker controlled executables. This could result in an attacker gaining access to a user's device and data, and remote code execution.
Data is provided by the National Vulnerability Database (NVD)
Zoom ≫ Virtual Desktop Infrastructure Version < 5.13.10
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.78% | 0.726 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 7.5 | 1.6 | 5.9 |
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
|
security@zoom.us | 8.3 | 1.6 | 6 |
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
|
CWE-501 Trust Boundary Violation
The product mixes trusted and untrusted data in the same data structure or structured message.