Zoom clients prior to 5.13.5 contain an improper trust boundary implementation vulnerability. If a victim saves a local recording to an SMB location and later opens it using a link from Zoom’s web portal, an attacker positioned on an adjacent network to the victim client could set up a malicious SMB server to respond to client requests, causing the client to execute attacker controlled executables. This could result in an attacker gaining access to a user's device and data, and remote code execution.
2023-03-27T21:15:12.260
2025-02-19T16:15:37.990
Modified
CVSSv3.1: 8.3 (HIGH)
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | zoom | rooms | < 5.13.5 | Yes |
Application | zoom | rooms | < 5.13.5 | Yes |
Application | zoom | rooms | < 5.13.5 | Yes |
Application | zoom | rooms | < 5.13.5 | Yes |
Application | zoom | rooms | < 5.13.5 | Yes |
Application | zoom | zoom | < 5.13.5 | Yes |
Application | zoom | zoom | < 5.13.5 | Yes |
Application | zoom | zoom | < 5.13.5 | Yes |
Application | zoom | zoom | < 5.13.5 | Yes |
Application | zoom | zoom | < 5.13.5 | Yes |
Application | zoom | virtual_desktop_infrastructure | < 5.13.10 | Yes |
Operating System | microsoft | windows | - | No |