Some of the company’s developers have classified security gaps in the web conference software Zoom as high risk. Some could have enabled attackers to inject malicious code into users or to extend rights in the system. Updates to patch the leaks are ready.
Zoom: High-risk vulnerabilities
The vulnerability with the highest risk rating relates to saving a local recording to an SMB share and later opening the file using a link from the Zoom web portal. Attackers from adjacent networks could use a malicious SMB server to answer client requests and thus foist their own executable files on victims (CVE-2023-22885, CVSS 8.3Risk “hoch“).
The Windows installer from the Zoom client for IT administrators enabled attackers to extend their own rights in the system. In a chain of attacks, malicious actors could gain system privileges during the installation process (CVE-2023-22883, CVSS 7.2, hoch). A similar vulnerability can be found in the Mac installer of the Zoom client for IT admins, where local attackers could gain root privileges (CVE-2023-22884, CVSS 5.2, middle).
An update to the Microsoft Edge WebView2 component has made Zoom clients, Zoom Rooms and Zoom VDI vulnerable to an information leak on Windows. The component sent texts to Microsoft’s online spell checker instead of local proofreading. To solve the problem, the developers simply turned off the check function (2023-22880, CVSS 6.8, middle). Another vulnerability could have been abused by attackers with manipulated UDP packets to shoot down zoom clients. These crashed due to errors in the STUN parser during processing, resulting in a possible denial of service (CVE-2023-22881, CVE-2023-22882; both CVSS 6.5, middle).
Fixed issue with updated software
The vulnerabilities affect Zoom for Android, iOS, Linux, macOS and Windows prior to version 5.13.5, Zoom Rooms for Android, iOS, Linux, macOS and Windows prior to version 5.13.5, Zoom VDI Windows Meeting clients prior to the current version 5.13. 10, Zoom Client for Meetings for IT Admins Windows Installers prior to 5.13.5 and Zoom Client for Meetings for IT Admin macOS Installers prior to 5.13.5. The manufacturer lists the security notifications on the Zoom security website.
These also contain more details on the vulnerabilities and the versions specifically affected by them. Administrators can download updated software from the Zoom download website. The function for checking for updates, which can be called up in the software, should also transfer the current status to the computer.
Zoom last released software updates in January of this year. The company has also closed various security gaps in it.
(dmk)
To home page