Zoom clients prior to 5.13.5 contain an improper trust boundary implementation vulnerability. If a victim saves a local recording to an SMB location and later opens it using a link from Zoom’s web portal, an attacker positioned on an adjacent network to the victim client could set up a malicious SMB server to respond to client requests, causing the client to execute attacker controlled executables. This could result in an attacker gaining access to a user's device and data, and remote code execution.
                
            References
                    | Link | Resource | 
|---|---|
| https://explore.zoom.us/en/trust/security/security-bulletin/ | Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
            
            
  | 
    
Configuration 2 (hide)
| AND | 
            
            
 
  | 
    
History
                    No history.
Information
                Published : 2023-03-27 21:15
Updated : 2023-04-03 14:22
NVD link : CVE-2023-28597
Mitre link : CVE-2023-28597
CVE.ORG link : CVE-2023-28597
JSON object : View
Products Affected
                zoom
- zoom
 - virtual_desktop_infrastructure
 - rooms
 
microsoft
- windows
 
CWE
                