Zoom Client: Improper Auth Allows Priv Escalation via Net Access
CVE-2023-43582 Published on November 15, 2023

Improper authorization in some Zoom clients may allow an authorized user to conduct an escalation of privilege via network access.

NVD

Vulnerability Analysis

CVE-2023-43582 is exploitable with network access, requires user interaction and a small amount of user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to be low. considered to have a small impact on confidentiality and integrity and availability.

Attack Vector:
NETWORK
Attack Complexity:
LOW
Privileges Required:
LOW
User Interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality Impact:
LOW
Integrity Impact:
LOW
Availability Impact:
LOW

Weakness Type

Improper Authorization in Handler for Custom URL Scheme

The software uses a handler for a custom URL scheme, but it does not properly restrict which actors can invoke the handler using the scheme. Mobile platforms and other architectures allow the use of custom URL schemes to facilitate communication between applications. In the case of iOS, this is the only method to do inter-application communication. The implementation is at the developer's discretion which may open security flaws in the application. An example could be potentially dangerous functionality such as modifying files through a custom URL scheme.


Products Associated with CVE-2023-43582

Want to know whenever a new CVE is published for Zoom products? stack.watch will email you.

 
 
 
 

Affected Versions

Zoom Video Communications, Inc. Zoom Clients Version see references is affected by CVE-2023-43582

Exploit Probability

EPSS
0.16%
Percentile
37.17%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.