Zoom Desktop Client <5.15.2 Escalation via Untrusted Special Elements
CVE-2023-39213 Published on August 8, 2023
Improper neutralization of special elements in Zoom Desktop Client for Windows and Zoom VDI Client before 5.15.2 may allow an unauthenticated user to enable an escalation of privilege via network access.
Vulnerability Analysis
CVE-2023-39213 can be exploited with network access, requires user interaction. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to be critical as this vulnerability has a high impact to the confidentiality, integrity and availability of this component.
Weakness Type
Improper Handling of Unicode Encoding
The software does not properly handle when an input contains Unicode encoding.
Products Associated with CVE-2023-39213
stack.watch emails you whenever new vulnerabilities are published in Zoom Virtual Desktop Infrastructure or Zoom. Just hit a watch button to start following.
Affected Versions
Zoom Video Communications, Inc. Zoom Desktop Client for Windows and Zoom VDI Client Version before 5.15.2 is affected by CVE-2023-39213Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.