Zoom VDI Client Installer <5.14.0: Improper Access Control Allows File Deletion
CVE-2023-28603 Published on June 13, 2023

Zoom VDI client installer prior to 5.14.0 contains an improper access control vulnerability. A malicious user may potentially delete local files without proper permissions.

NVD

Vulnerability Analysis

CVE-2023-28603 can be exploited with local system access, and requires small amount of user privileges. This vulnerability is consided to have a high level of attack complexity. The potential impact of an exploit of this vulnerability is considered to have a high impact on confidentiality and integrity, and a small impact on availability.

Attack Vector:
LOCAL
Attack Complexity:
HIGH
Privileges Required:
LOW
User Interaction:
NONE
Scope:
CHANGED
Confidentiality Impact:
HIGH
Integrity Impact:
HIGH
Availability Impact:
LOW

Weakness Type

External Control of File Name or Path

The software allows user input to control or influence paths or file names that are used in filesystem operations.


Products Associated with CVE-2023-28603

stack.watch emails you whenever new vulnerabilities are published in Zoom Virtual Desktop Infrastructure or Zoom. Just hit a watch button to start following.

 
 

Affected Versions

Zoom Video Communications, Inc. Zoom VDI Windows Meeting Client Version before 5.14.0 is affected by CVE-2023-28603

Exploit Probability

EPSS
0.02%
Percentile
6.07%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.