Zoom Client: Improper Auth Allows Priv Escalation via Net Access
CVE-2023-43582 Published on November 15, 2023
Improper authorization in some Zoom clients may allow an authorized user to conduct an escalation of privilege via network access.
Vulnerability Analysis
CVE-2023-43582 is exploitable with network access, requires user interaction and a small amount of user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to be low. considered to have a small impact on confidentiality and integrity and availability.
Weakness Type
Improper Authorization in Handler for Custom URL Scheme
The software uses a handler for a custom URL scheme, but it does not properly restrict which actors can invoke the handler using the scheme. Mobile platforms and other architectures allow the use of custom URL schemes to facilitate communication between applications. In the case of iOS, this is the only method to do inter-application communication. The implementation is at the developer's discretion which may open security flaws in the application. An example could be potentially dangerous functionality such as modifying files through a custom URL scheme.
Products Associated with CVE-2023-43582
Want to know whenever a new CVE is published for Zoom products? stack.watch will email you.
Affected Versions
Zoom Video Communications, Inc. Zoom Clients Version see references is affected by CVE-2023-43582Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.