Vulnerabilites related to Zoom Video Communications, Inc. - Zoom Clients
cve-2023-49646
Vulnerability from cvelistv5
Published
2023-12-13 22:19
Modified
2024-09-20 14:53
Severity ?
EPSS score ?
Summary
Improper authentication in some Zoom clients before version 5.16.5 may allow an authenticated user to conduct a denial of service via network access.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Video Communications, Inc. | Zoom Clients |
Version: See references |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T22:01:25.386Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://www.zoom.com/en/trust/security-bulletin/ZSB-23062/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "unaffected", platforms: [ "Windows", "MacOS", "Linux", "iOS", "Android", ], product: "Zoom Clients", vendor: "Zoom Video Communications, Inc.", versions: [ { status: "affected", version: "See references", }, ], }, ], datePublic: "2023-12-12T16:00:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "Improper authentication in some Zoom clients before version 5.16.5 may allow an authenticated user to conduct a denial of service via network access.", }, ], value: "Improper authentication in some Zoom clients before version 5.16.5 may allow an authenticated user to conduct a denial of service via network access.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 6.4, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-347", description: "CWE-347 Improper Verification of Cryptographic Signature", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-09-20T14:53:41.733Z", orgId: "99b9af0d-a833-4a5d-9e2f-8b1324f35351", shortName: "Zoom", }, references: [ { url: "https://www.zoom.com/en/trust/security-bulletin/ZSB-23062/", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "99b9af0d-a833-4a5d-9e2f-8b1324f35351", assignerShortName: "Zoom", cveId: "CVE-2023-49646", datePublished: "2023-12-13T22:19:26.963Z", dateReserved: "2023-11-28T18:18:33.930Z", dateUpdated: "2024-09-20T14:53:41.733Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-39205
Vulnerability from cvelistv5
Published
2023-11-14 22:32
Modified
2024-08-29 15:20
Severity ?
EPSS score ?
Summary
Improper conditions check in Zoom Team Chat for Zoom clients may allow an authenticated user to conduct a denial of service via network access.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Video Communications, Inc. | Zoom Clients |
Version: see references |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T18:02:06.477Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://explore.zoom.us/en/trust/security/security-bulletin/", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2023-39205", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-08-29T15:18:14.262007Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-08-29T15:20:19.803Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", platforms: [ "Windows", "MacOS", "Linux", "iOS", "Android", ], product: "Zoom Clients", vendor: "Zoom Video Communications, Inc.", versions: [ { status: "affected", version: "see references", }, ], }, ], datePublic: "2023-11-14T16:00:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "Improper conditions check in Zoom Team Chat for Zoom clients may allow an authenticated user to conduct a denial of service via network access.", }, ], value: "Improper conditions check in Zoom Team Chat for Zoom clients may allow an authenticated user to conduct a denial of service via network access.", }, ], impacts: [ { capecId: "CAPEC-26", descriptions: [ { lang: "en", value: "CAPEC-26 Leveraging Race Conditions", }, ], }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-754", description: "CWE-754 Improper Check for Unusual or Exceptional Conditions", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-11-14T22:32:18.711Z", orgId: "99b9af0d-a833-4a5d-9e2f-8b1324f35351", shortName: "Zoom", }, references: [ { url: "https://explore.zoom.us/en/trust/security/security-bulletin/", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "99b9af0d-a833-4a5d-9e2f-8b1324f35351", assignerShortName: "Zoom", cveId: "CVE-2023-39205", datePublished: "2023-11-14T22:32:18.711Z", dateReserved: "2023-07-25T18:37:58.424Z", dateUpdated: "2024-08-29T15:20:19.803Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-36532
Vulnerability from cvelistv5
Published
2023-08-08 17:30
Modified
2024-10-09 16:25
Severity ?
EPSS score ?
Summary
Buffer overflow in Zoom Clients before 5.14.5 may allow an unauthenticated user to enable a denial of service via network access.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Video Communications, Inc. | Zoom Clients |
Version: before 5.14.5 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T16:52:52.384Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://explore.zoom.us/en/trust/security/security-bulletin/", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2023-36532", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-10-09T16:16:56.351712Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-09T16:25:28.757Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "Zoom Clients", vendor: "Zoom Video Communications, Inc.", versions: [ { status: "affected", version: "before 5.14.5", }, ], }, ], datePublic: "2023-08-08T15:00:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "Buffer overflow in Zoom Clients before 5.14.5 may allow an unauthenticated user to enable a denial of service via network access.", }, ], value: "Buffer overflow in Zoom Clients before 5.14.5 may allow an unauthenticated user to enable a denial of service via network access.", }, ], impacts: [ { capecId: "CAPEC-100", descriptions: [ { lang: "en", value: "CAPEC-100 Overflow Buffers", }, ], }, ], metrics: [ { cvssV3_1: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 5.9, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-122", description: "CWE-122: Buffer Overflow", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-08-08T17:30:58.217Z", orgId: "99b9af0d-a833-4a5d-9e2f-8b1324f35351", shortName: "Zoom", }, references: [ { url: "https://explore.zoom.us/en/trust/security/security-bulletin/", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "99b9af0d-a833-4a5d-9e2f-8b1324f35351", assignerShortName: "Zoom", cveId: "CVE-2023-36532", datePublished: "2023-08-08T17:30:58.217Z", dateReserved: "2023-06-22T18:04:31.168Z", dateUpdated: "2024-10-09T16:25:28.757Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-36539
Vulnerability from cvelistv5
Published
2023-06-30 02:01
Modified
2024-10-28 13:04
Severity ?
EPSS score ?
Summary
Exposure of information intended to be encrypted by some Zoom clients may lead to disclosure of sensitive information.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Video Communications, Inc. | Zoom clients |
Version: See references link for ZSB-23025 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T16:52:52.360Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://explore.zoom.us/en/trust/security/security-bulletin/", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2023-36539", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-10-28T13:04:31.982326Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-28T13:04:46.477Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "Zoom clients", vendor: "Zoom Video Communications, Inc.", versions: [ { status: "affected", version: "See references link for ZSB-23025", }, ], }, ], datePublic: "2023-06-30T02:00:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<span style=\"background-color: rgb(247, 247, 250);\">Exposure of information intended to be encrypted by some Zoom clients may lead to disclosure of sensitive information.</span>", }, ], value: "Exposure of information intended to be encrypted by some Zoom clients may lead to disclosure of sensitive information.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-200", description: "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", lang: "en", type: "CWE", }, ], }, { descriptions: [ { cweId: "CWE-325", description: "CWE-325 Missing Cryptographic Step", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-09-18T18:25:53.635Z", orgId: "99b9af0d-a833-4a5d-9e2f-8b1324f35351", shortName: "Zoom", }, references: [ { url: "https://explore.zoom.us/en/trust/security/security-bulletin/", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "99b9af0d-a833-4a5d-9e2f-8b1324f35351", assignerShortName: "Zoom", cveId: "CVE-2023-36539", datePublished: "2023-06-30T02:01:21.401Z", dateReserved: "2023-06-22T18:04:31.169Z", dateUpdated: "2024-10-28T13:04:46.477Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-39206
Vulnerability from cvelistv5
Published
2023-11-14 23:02
Modified
2024-08-29 15:45
Severity ?
EPSS score ?
Summary
Buffer overflow in some Zoom clients may allow an unauthenticated user to conduct a denial of service via network access.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Video Communications, Inc. | Zoom Clients |
Version: see references |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T18:02:06.479Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://explore.zoom.us/en/trust/security/security-bulletin/", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2023-39206", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-08-29T15:33:18.137787Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-08-29T15:45:07.488Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", platforms: [ "Windows", "MacOS", "Linux", "iOS", "Android", ], product: "Zoom Clients", vendor: "Zoom Video Communications, Inc.", versions: [ { status: "affected", version: "see references", }, ], }, ], datePublic: "2023-11-14T16:00:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "Buffer overflow in some Zoom clients may allow an unauthenticated user to conduct a denial of service via network access.", }, ], value: "Buffer overflow in some Zoom clients may allow an unauthenticated user to conduct a denial of service via network access.", }, ], impacts: [ { capecId: "CAPEC-100", descriptions: [ { lang: "en", value: "CAPEC-100 Overflow Buffers", }, ], }, ], metrics: [ { cvssV3_1: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 3.7, baseSeverity: "LOW", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-120", description: "CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-11-14T23:02:41.332Z", orgId: "99b9af0d-a833-4a5d-9e2f-8b1324f35351", shortName: "Zoom", }, references: [ { url: "https://explore.zoom.us/en/trust/security/security-bulletin/", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "99b9af0d-a833-4a5d-9e2f-8b1324f35351", assignerShortName: "Zoom", cveId: "CVE-2023-39206", datePublished: "2023-11-14T23:02:41.332Z", dateReserved: "2023-07-25T18:37:58.424Z", dateUpdated: "2024-08-29T15:45:07.488Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-39204
Vulnerability from cvelistv5
Published
2023-11-14 22:28
Modified
2024-08-29 15:20
Severity ?
EPSS score ?
Summary
Buffer overflow in some Zoom clients may allow an unauthenticated user to conduct a denial of service via network access.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Video Communications, Inc. | Zoom Clients |
Version: see references |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T18:02:06.451Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://explore.zoom.us/en/trust/security/security-bulletin/", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2023-39204", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-08-29T15:12:00.315832Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-08-29T15:20:45.432Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", platforms: [ "Windows", "MacOS", "Linux", "iOS", "Android", ], product: "Zoom Clients", vendor: "Zoom Video Communications, Inc.", versions: [ { status: "affected", version: "see references", }, ], }, ], datePublic: "2023-11-14T16:00:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "Buffer overflow in some Zoom clients may allow an unauthenticated user to conduct a denial of service via network access.", }, ], value: "Buffer overflow in some Zoom clients may allow an unauthenticated user to conduct a denial of service via network access.", }, ], impacts: [ { capecId: "CAPEC-100", descriptions: [ { lang: "en", value: "CAPEC-100 Overflow Buffers", }, ], }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-120", description: "CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-11-14T22:28:44.622Z", orgId: "99b9af0d-a833-4a5d-9e2f-8b1324f35351", shortName: "Zoom", }, references: [ { url: "https://explore.zoom.us/en/trust/security/security-bulletin/", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "99b9af0d-a833-4a5d-9e2f-8b1324f35351", assignerShortName: "Zoom", cveId: "CVE-2023-39204", datePublished: "2023-11-14T22:28:44.622Z", dateReserved: "2023-07-25T18:37:58.424Z", dateUpdated: "2024-08-29T15:20:45.432Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-39215
Vulnerability from cvelistv5
Published
2023-09-12 19:53
Modified
2024-09-27 19:08
Severity ?
EPSS score ?
Summary
Improper authentication in Zoom clients may allow an authenticated user to conduct a denial of service via network access.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Video Communications, Inc. | Zoom Clients |
Version: see reference |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T18:02:06.576Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://explore.zoom.us/en/trust/security/security-bulletin/", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2023-39215", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-09-25T14:56:51.859251Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-09-25T15:21:22.337Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "Zoom Clients", vendor: "Zoom Video Communications, Inc.", versions: [ { status: "affected", version: "see reference", }, ], }, ], datePublic: "2023-09-12T15:00:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "Improper authentication in Zoom clients may allow an authenticated user to conduct a denial of service via network access.", }, ], value: "Improper authentication in Zoom clients may allow an authenticated user to conduct a denial of service via network access.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.1, baseSeverity: "HIGH", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-449", description: "CWE-449: The UI Performs the Wrong Action", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-09-27T19:08:23.362Z", orgId: "99b9af0d-a833-4a5d-9e2f-8b1324f35351", shortName: "Zoom", }, references: [ { url: "https://explore.zoom.us/en/trust/security/security-bulletin/", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "99b9af0d-a833-4a5d-9e2f-8b1324f35351", assignerShortName: "Zoom", cveId: "CVE-2023-39215", datePublished: "2023-09-12T19:53:25.817Z", dateReserved: "2023-07-25T18:38:00.938Z", dateUpdated: "2024-09-27T19:08:23.362Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-39199
Vulnerability from cvelistv5
Published
2023-11-14 23:06
Modified
2024-09-19 13:50
Severity ?
EPSS score ?
Summary
Cryptographic issues with In-Meeting Chat for some Zoom clients may allow a privileged user to conduct an information disclosure via network access.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Video Communications, Inc. | Zoom Clients |
Version: see references |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T18:02:05.986Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://explore.zoom.us/en/trust/security/security-bulletin/", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2023-39199", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-08-29T15:33:25.333843Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-08-29T15:44:49.906Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", platforms: [ "Windows", "MacOS", "Linux", "iOS", "Android", ], product: "Zoom Clients", vendor: "Zoom Video Communications, Inc.", versions: [ { status: "affected", version: "see references", }, ], }, ], datePublic: "2023-11-14T16:00:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "Cryptographic issues with In-Meeting Chat for some Zoom clients may allow a privileged user to conduct an information disclosure via network access.", }, ], value: "Cryptographic issues with In-Meeting Chat for some Zoom clients may allow a privileged user to conduct an information disclosure via network access.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.9, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-325", description: "CWE-325 Missing Cryptographic Step", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-09-19T13:50:58.529Z", orgId: "99b9af0d-a833-4a5d-9e2f-8b1324f35351", shortName: "Zoom", }, references: [ { url: "https://explore.zoom.us/en/trust/security/security-bulletin/", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "99b9af0d-a833-4a5d-9e2f-8b1324f35351", assignerShortName: "Zoom", cveId: "CVE-2023-39199", datePublished: "2023-11-14T23:06:21.805Z", dateReserved: "2023-07-25T18:37:58.423Z", dateUpdated: "2024-09-19T13:50:58.529Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-39218
Vulnerability from cvelistv5
Published
2023-08-08 17:54
Modified
2024-10-10 16:20
Severity ?
EPSS score ?
Summary
Client-side enforcement of server-side security in Zoom clients before 5.14.10 may allow a privileged user to enable information disclosure via network access.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Video Communications, Inc. | Zoom Clients |
Version: before 5.14.10 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T18:02:05.243Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://explore.zoom.us/en/trust/security/security-bulletin/", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2023-39218", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-10-10T16:20:49.320796Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-10T16:20:58.392Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "Zoom Clients", vendor: "Zoom Video Communications, Inc.", versions: [ { status: "affected", version: "before 5.14.10", }, ], }, ], datePublic: "2023-08-08T15:00:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "Client-side enforcement of server-side security in Zoom clients before 5.14.10 may allow a privileged user to enable information disclosure via network access.", }, ], value: "Client-side enforcement of server-side security in Zoom clients before 5.14.10 may allow a privileged user to enable information disclosure via network access.", }, ], impacts: [ { capecId: "CAPEC-22", descriptions: [ { lang: "en", value: "CAPEC-22: Exploiting Trust in Client", }, ], }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-602", description: "CWE-602: Client-Side Enforcement of Server-Side Security", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-08-08T17:54:59.577Z", orgId: "99b9af0d-a833-4a5d-9e2f-8b1324f35351", shortName: "Zoom", }, references: [ { url: "https://explore.zoom.us/en/trust/security/security-bulletin/", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "99b9af0d-a833-4a5d-9e2f-8b1324f35351", assignerShortName: "Zoom", cveId: "CVE-2023-39218", datePublished: "2023-08-08T17:54:59.577Z", dateReserved: "2023-07-25T18:38:00.939Z", dateUpdated: "2024-10-10T16:20:58.392Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-24697
Vulnerability from cvelistv5
Published
2024-02-13 23:53
Modified
2024-08-01 23:28
Severity ?
EPSS score ?
Summary
Untrusted search path in some Zoom 32 bit Windows clients may allow an authenticated user to conduct an escalation of privilege via local access.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Video Communications, Inc. | Zoom Clients |
Version: see references |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-01T23:28:11.187Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://www.zoom.com/en/trust/security-bulletin/ZSB-24004/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "unaffected", platforms: [ "Windows", ], product: "Zoom Clients", vendor: "Zoom Video Communications, Inc.", versions: [ { status: "affected", version: "see references", }, ], }, ], datePublic: "2024-02-13T13:00:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "Untrusted search path in some Zoom 32 bit Windows clients may allow an authenticated user to conduct an escalation of privilege via local access.<br>", }, ], value: "Untrusted search path in some Zoom 32 bit Windows clients may allow an authenticated user to conduct an escalation of privilege via local access.\n", }, ], impacts: [ { capecId: "CAPEC-471", descriptions: [ { lang: "en", value: "CAPEC-471 Search Order Hijacking", }, ], }, ], metrics: [ { cvssV3_1: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.2, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-426", description: "CWE-426 Untrusted Search Path", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-02-13T23:53:43.589Z", orgId: "99b9af0d-a833-4a5d-9e2f-8b1324f35351", shortName: "Zoom", }, references: [ { url: "https://www.zoom.com/en/trust/security-bulletin/ZSB-24004/", }, ], source: { discovery: "UNKNOWN", }, title: "Zoom Clients - Untrusted Search Path", x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "99b9af0d-a833-4a5d-9e2f-8b1324f35351", assignerShortName: "Zoom", cveId: "CVE-2024-24697", datePublished: "2024-02-13T23:53:43.589Z", dateReserved: "2024-01-26T22:56:14.681Z", dateUpdated: "2024-08-01T23:28:11.187Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-24699
Vulnerability from cvelistv5
Published
2024-02-13 23:58
Modified
2025-03-13 17:31
Severity ?
EPSS score ?
Summary
Business logic error in some Zoom clients may allow an authenticated user to conduct information disclosure via network access.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Video Communications, Inc. | Zoom Clients |
Version: see references |
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-24699", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-02-14T14:00:35.091787Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { description: "CWE-noinfo Not enough information", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-13T17:31:26.034Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, { providerMetadata: { dateUpdated: "2024-08-01T23:28:11.153Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://www.zoom.com/en/trust/security-bulletin/ZSB-24006/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "unaffected", platforms: [ "Windows", "iOS", "Linux", "Android", ], product: "Zoom Clients", vendor: "Zoom Video Communications, Inc.", versions: [ { status: "affected", version: "see references", }, ], }, ], datePublic: "2024-02-13T13:00:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "Business logic error in some Zoom clients may allow an authenticated user to conduct information disclosure via network access.<br>", }, ], value: "Business logic error in some Zoom clients may allow an authenticated user to conduct information disclosure via network access.\n", }, ], impacts: [ { capecId: "CAPEC-441", descriptions: [ { lang: "en", value: "CAPEC-441 Malicious Logic Insertion", }, ], }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { description: "Business Logic Error", lang: "en", }, ], }, ], providerMetadata: { dateUpdated: "2024-02-13T23:58:44.327Z", orgId: "99b9af0d-a833-4a5d-9e2f-8b1324f35351", shortName: "Zoom", }, references: [ { url: "https://www.zoom.com/en/trust/security-bulletin/ZSB-24006/", }, ], source: { discovery: "UNKNOWN", }, title: "Zoom Clients - Business Logic Error", x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "99b9af0d-a833-4a5d-9e2f-8b1324f35351", assignerShortName: "Zoom", cveId: "CVE-2024-24699", datePublished: "2024-02-13T23:58:44.327Z", dateReserved: "2024-01-26T22:56:14.681Z", dateUpdated: "2025-03-13T17:31:26.034Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-36535
Vulnerability from cvelistv5
Published
2023-08-08 17:39
Modified
2024-10-08 15:03
Severity ?
EPSS score ?
Summary
Client-side enforcement of server-side security in Zoom clients before 5.14.10 may allow an authenticated user to enable information disclosure via network access.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Video Communications, Inc. | Zoom Clients |
Version: before 5.14.10 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T16:52:52.352Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://explore.zoom.us/en/trust/security/security-bulletin/", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2023-36535", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-10-08T15:00:22.199594Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-08T15:03:49.453Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "Zoom Clients", vendor: "Zoom Video Communications, Inc.", versions: [ { status: "affected", version: "before 5.14.10", }, ], }, ], datePublic: "2023-08-08T15:00:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "Client-side enforcement of server-side security in Zoom clients before 5.14.10 may allow an authenticated user to enable information disclosure via network access.", }, ], value: "Client-side enforcement of server-side security in Zoom clients before 5.14.10 may allow an authenticated user to enable information disclosure via network access.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 7.1, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-449", description: "CWE-449: The UI Performs the Wrong Action", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-09-27T18:47:30.828Z", orgId: "99b9af0d-a833-4a5d-9e2f-8b1324f35351", shortName: "Zoom", }, references: [ { url: "https://explore.zoom.us/en/trust/security/security-bulletin/", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "99b9af0d-a833-4a5d-9e2f-8b1324f35351", assignerShortName: "Zoom", cveId: "CVE-2023-36535", datePublished: "2023-08-08T17:39:51.259Z", dateReserved: "2023-06-22T18:04:31.168Z", dateUpdated: "2024-10-08T15:03:49.453Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-24698
Vulnerability from cvelistv5
Published
2024-02-13 23:56
Modified
2024-09-27 19:28
Severity ?
EPSS score ?
Summary
Improper authentication in some Zoom clients may allow a privileged user to conduct a disclosure of information via local access.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Video Communications, Inc. | Zoom Clients |
Version: see references |
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-24698", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-02-14T15:30:17.531210Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-06-04T17:43:32.245Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, { providerMetadata: { dateUpdated: "2024-08-01T23:28:11.903Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://www.zoom.com/en/trust/security-bulletin/ZSB-24005/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "unaffected", platforms: [ "Windows", "iOS", "Linux", "Android", ], product: "Zoom Clients", vendor: "Zoom Video Communications, Inc.", versions: [ { status: "affected", version: "see references", }, ], }, ], datePublic: "2024-02-13T13:00:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "Improper authentication in some Zoom clients may allow a privileged user to conduct a disclosure of information via local access.<br>", }, ], value: "Improper authentication in some Zoom clients may allow a privileged user to conduct a disclosure of information via local access.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.9, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-449", description: "CWE-449: The UI Performs the Wrong Action", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-09-27T19:28:28.333Z", orgId: "99b9af0d-a833-4a5d-9e2f-8b1324f35351", shortName: "Zoom", }, references: [ { url: "https://www.zoom.com/en/trust/security-bulletin/ZSB-24005/", }, ], source: { discovery: "UNKNOWN", }, title: "Zoom Clients - Improper Authentication", x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "99b9af0d-a833-4a5d-9e2f-8b1324f35351", assignerShortName: "Zoom", cveId: "CVE-2024-24698", datePublished: "2024-02-13T23:56:14.515Z", dateReserved: "2024-01-26T22:56:14.681Z", dateUpdated: "2024-09-27T19:28:28.333Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-43582
Vulnerability from cvelistv5
Published
2023-11-14 23:12
Modified
2024-09-19 13:52
Severity ?
EPSS score ?
Summary
Improper authorization in some Zoom clients may allow an authorized user to conduct an escalation of privilege via network access.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Video Communications, Inc. | Zoom Clients |
Version: see references |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T19:44:43.848Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://explore.zoom.us/en/trust/security/security-bulletin/", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2023-43582", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-08-29T15:33:44.880769Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-08-29T15:38:56.542Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", platforms: [ "Windows", "MacOS", "Linux", "iOS", "Android", ], product: "Zoom Clients", vendor: "Zoom Video Communications, Inc.", versions: [ { status: "affected", version: "see references", }, ], }, ], datePublic: "2023-11-14T16:00:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "Improper authorization in some Zoom clients may allow an authorized user to conduct an escalation of privilege via network access.<br>", }, ], value: "Improper authorization in some Zoom clients may allow an authorized user to conduct an escalation of privilege via network access.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-939", description: "CWE-939 Improper Authorization in Handler for Custom URL Scheme", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-09-19T13:52:36.217Z", orgId: "99b9af0d-a833-4a5d-9e2f-8b1324f35351", shortName: "Zoom", }, references: [ { url: "https://explore.zoom.us/en/trust/security/security-bulletin/", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "99b9af0d-a833-4a5d-9e2f-8b1324f35351", assignerShortName: "Zoom", cveId: "CVE-2023-43582", datePublished: "2023-11-14T23:12:32.799Z", dateReserved: "2023-09-19T22:05:40.665Z", dateUpdated: "2024-09-19T13:52:36.217Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-43588
Vulnerability from cvelistv5
Published
2023-11-14 23:11
Modified
2024-09-20 14:58
Severity ?
EPSS score ?
Summary
Insufficient control flow management in some Zoom clients may allow an authenticated user to conduct an information disclosure via network access.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Video Communications, Inc. | Zoom Clients |
Version: see references |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T19:44:43.701Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://explore.zoom.us/en/trust/security/security-bulletin/", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2023-43588", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-08-29T15:33:33.640598Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-08-29T15:39:14.149Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", platforms: [ "Windows", "MacOS", "Linux", "iOS", ], product: "Zoom Clients", vendor: "Zoom Video Communications, Inc.", versions: [ { status: "affected", version: "see references", }, ], }, ], datePublic: "2023-11-14T16:00:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "Insufficient control flow management in some Zoom clients may allow an authenticated user to conduct an information disclosure via network access.<br><br>", }, ], value: "Insufficient control flow management in some Zoom clients may allow an authenticated user to conduct an information disclosure via network access.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 3.5, baseSeverity: "LOW", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-449", description: "CWE-449: The UI Performs the Wrong Action", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-09-20T14:58:08.976Z", orgId: "99b9af0d-a833-4a5d-9e2f-8b1324f35351", shortName: "Zoom", }, references: [ { url: "https://explore.zoom.us/en/trust/security/security-bulletin/", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "99b9af0d-a833-4a5d-9e2f-8b1324f35351", assignerShortName: "Zoom", cveId: "CVE-2023-43588", datePublished: "2023-11-14T23:11:18.161Z", dateReserved: "2023-09-19T22:05:40.666Z", dateUpdated: "2024-09-20T14:58:08.976Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-24690
Vulnerability from cvelistv5
Published
2024-02-14 00:00
Modified
2024-09-20 14:50
Severity ?
EPSS score ?
Summary
Improper input validation in some Zoom clients may allow an authenticated user to conduct a denial of service via network access.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Video Communications, Inc. | Zoom Clients |
Version: see references |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-01T23:28:11.165Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://www.zoom.com/en/trust/security-bulletin/ZSB-24007/", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2024-24690", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-08-16T18:16:12.891310Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-08-16T18:16:23.329Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", platforms: [ "Windows", "iOS", "Linux", "Android", ], product: "Zoom Clients", vendor: "Zoom Video Communications, Inc.", versions: [ { status: "affected", version: "see references", }, ], }, ], datePublic: "2024-02-13T13:00:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "Improper input validation in some Zoom clients may allow an authenticated user to conduct a denial of service via network access.<br>", }, ], value: "Improper input validation in some Zoom clients may allow an authenticated user to conduct a denial of service via network access.", }, ], impacts: [ { capecId: "CAPEC-153", descriptions: [ { lang: "en", value: "CAPEC-153 Input Data Manipulation", }, ], }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 5.4, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-1284", description: "CWE-1284: Improper Validation of Specified Quantity in Input", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-09-20T14:50:06.835Z", orgId: "99b9af0d-a833-4a5d-9e2f-8b1324f35351", shortName: "Zoom", }, references: [ { url: "https://www.zoom.com/en/trust/security-bulletin/ZSB-24007/", }, ], source: { discovery: "UNKNOWN", }, title: "Zoom Clients - Improper Input Validation", x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "99b9af0d-a833-4a5d-9e2f-8b1324f35351", assignerShortName: "Zoom", cveId: "CVE-2024-24690", datePublished: "2024-02-14T00:00:04.089Z", dateReserved: "2024-01-26T22:56:14.680Z", dateUpdated: "2024-09-20T14:50:06.835Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }