SB2023031504 - Multiple vulnerabilities in Zoom clients
Published: March 15, 2023 Updated: June 12, 2023
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 4 secuirty vulnerabilities.
1) Man-in-the-Middle (MitM) attack (CVE-ID: CVE-2023-22885)
The vulnerability allows a remote attacker to compromise the affected system.
The vulnerability exists due to the way the Zoom client handles SMB shares. If a victim saves a local recording to an SMB location and later opens it using a link from Zoom’s web portal, an attacker positioned on an adjacent network to the victim client could set up a malicious SMB server to respond to client requests, causing the client to execute attacker controlled executables.
2) Input validation error (CVE-ID: CVE-2023-22882)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input when parsing STUN packets. A remote attacker can send specially crafted UDP traffic to the application and perform a denial of service (DoS) attack.
3) Input validation error (CVE-ID: CVE-2023-22881)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input when parsing STUN packets. A remote attacker can send specially crafted UDP traffic to the application and perform a denial of service (DoS) attack.
4) Improper Verification of Cryptographic Signature (CVE-ID: CVE-2023-28602)
The vulnerability allows a remote attacker to perform MitM attack.
The vulnerability exists due to improper verification of cryptographic signature when upgrading Zoom. A remote attacker can downgrade Zoom Client components to previous versions.
Remediation
Install update from vendor's website.