![]() Zoom VDI Windows Meeting clients before version 5.13.10.Zoom Rooms (for Linux, macOS, and Windows) clients before version 5.13.5.Zoom (for Linux, macOS, and Windows) clients before version 5.13.5.*Changes - Removed Android and iOS from the “Affected Products” section Users can help keep themselves secure by applying current updates or downloading the latest Zoom software with all current security updates from. ![]() This could result in an attacker gaining access to a user's device and data, and remote code execution. If a victim saves a local recording to an SMB location and later opens it using a link from Zoom’s web portal, an attacker positioned on an adjacent network to the victim client could set up a malicious SMB server to respond to client requests, causing the client to execute attacker controlled executables. Source: Reported by Zoom Offensive Security Team.ĬVSS Vector String: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:Hĭescription: Zoom clients prior to 5.13.5 contain an improper trust boundary implementation vulnerability.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |