SB2023031504 - Multiple vulnerabilities in Zoom clients



SB2023031504 - Multiple vulnerabilities in Zoom clients

Published: March 15, 2023 Updated: June 12, 2023

Security Bulletin ID SB2023031504
Severity
Medium
Patch available
YES
Number of vulnerabilities 4
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Medium 75% Low 25%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) Man-in-the-Middle (MitM) attack (CVE-ID: CVE-2023-22885)

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to the way the Zoom client handles SMB shares. If a victim saves a local recording to an SMB location and later opens it using a link from Zoom’s web portal, an attacker positioned on an adjacent network to the victim client could set up a malicious SMB server to respond to client requests, causing the client to execute attacker controlled executables.


2) Input validation error (CVE-ID: CVE-2023-22882)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input when parsing STUN packets. A remote attacker can send specially crafted UDP traffic to the application and perform a denial of service (DoS) attack.


3) Input validation error (CVE-ID: CVE-2023-22881)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input when parsing STUN packets. A remote attacker can send specially crafted UDP traffic to the application and perform a denial of service (DoS) attack.


4) Improper Verification of Cryptographic Signature (CVE-ID: CVE-2023-28602)

The vulnerability allows a remote attacker to perform MitM attack.

The vulnerability exists due to improper verification of cryptographic signature when upgrading Zoom. A remote attacker can downgrade Zoom Client components to previous versions.


Remediation

Install update from vendor's website.