CVE-2023-28597
moderate-risk
Published 2023-03-27
Zoom clients prior to 5.13.5 contain an improper trust boundary implementation vulnerability. If a victim saves a local recording to an SMB location and later opens it using a link from Zoom’s web portal, an attacker positioned on an adjacent network to the victim client could set up a malicious SMB server to respond to client requests, causing the client to execute attacker controlled executables. This could result in an attacker gaining access to a user's device and data, and remote code execution.
Do I need to act?
-
0.76% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.3/10
High
ADJACENT_NETWORK
/ HIGH complexity
Affected Products (11)
Affected Vendors
References (2)
Vendor Advisory
https://explore.zoom.us/en/trust/security/security-bulletin/
Vendor Advisory
https://explore.zoom.us/en/trust/security/security-bulletin/
41
/ 100
moderate-risk
Severity
22/34 · High
Exploitability
3/34 · Minimal
Exposure
16/34 · Moderate