Zoom Desktop Client <5.15.2 Escalation via Untrusted Special Elements
CVE-2023-39213 Published on August 8, 2023

Improper neutralization of special elements in Zoom Desktop Client for Windows and Zoom VDI Client before 5.15.2 may allow an unauthenticated user to enable an escalation of privilege via network access.

NVD

Vulnerability Analysis

CVE-2023-39213 can be exploited with network access, requires user interaction. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to be critical as this vulnerability has a high impact to the confidentiality, integrity and availability of this component.

Attack Vector:
NETWORK
Attack Complexity:
LOW
Privileges Required:
NONE
User Interaction:
REQUIRED
Scope:
CHANGED
Confidentiality Impact:
HIGH
Integrity Impact:
HIGH
Availability Impact:
HIGH

Weakness Type

Improper Handling of Unicode Encoding

The software does not properly handle when an input contains Unicode encoding.


Products Associated with CVE-2023-39213

stack.watch emails you whenever new vulnerabilities are published in Zoom Virtual Desktop Infrastructure or Zoom. Just hit a watch button to start following.

 
 

Affected Versions

Zoom Video Communications, Inc. Zoom Desktop Client for Windows and Zoom VDI Client Version before 5.15.2 is affected by CVE-2023-39213

Exploit Probability

EPSS
0.85%
Percentile
74.61%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.