Vulnerability identifier: #VU77820
Vulnerability risk: Low
CVSSv4.0: 1.7 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-36539
CWE-ID:
CWE-319
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Zoom Workplace Desktop App for Windows
Client/Desktop applications /
Office applications
Zoom Workplace Desktop App for macOS
Client/Desktop applications /
Office applications
Zoom Workplace Desktop App for Linux
Client/Desktop applications /
Office applications
Zoom Rooms for Windows
Client/Desktop applications /
Office applications
Zoom Workplace App for iOS
Mobile applications /
Apps for mobile phones
Zoom Workplace App for Android
Mobile applications /
Apps for mobile phones
Zoom Rooms for macOS
Client/Desktop applications /
Messaging software
Zoom Meeting SDK for Windows
Universal components / Libraries /
Software for developers
Vendor: Zoom Video Communications, Inc.
Description
The vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to software did not use a per-meeting key to encrypt messages sent between user devices and Zoom, including messages sent during End-to-End Encrypted (E2EE) meetings.A remote attacker with ability to intercept and decrypt TLS communication can gain access to sensitive information.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
Zoom Workplace Desktop App for Windows: 5.15.0 17890 - 5.15.1 17948
Zoom Workplace Desktop App for macOS: 5.15.0 19644
Zoom Workplace Desktop App for Linux: 5.15.0 4063
Zoom Workplace App for iOS: 5.15.0 8765
Zoom Workplace App for Android: 5.15.0 14500
Zoom Rooms for Windows: 5.15.0 2989
Zoom Rooms for macOS: 5.15.0 3588
Zoom Meeting SDK for Windows: 5.15.1
External links
https://explore.zoom.us/en/trust/security/security-bulletin/#ZSB-23025
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.