CVE-2023-34121 Vulnerability Details

  /     /     /  

CVE-2023-34121 Metadata Quick Info

CVE Published: 13/06/2023 | CVE Updated: 19/09/2024 | CVE Year: 2023
Source: Zoom | Vendor: Zoom Video Communications, Inc. | Product: Zoom for Windows
Status : PUBLISHED

CVE-2023-34121 Description

Improper input validation in the Zoom for Windows, Zoom Rooms, Zoom VDI Windows Meeting clients before 5.14.0 may allow an authenticated user to potentially enable an escalation of privilege via network access.

Metrics

CVSS Version: 3.1 | Base Score: 4.1 MEDIUM
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N

l➤ Exploitability Metrics:
    Attack Vector (AV)* NETWORK
    Attack Complexity (AC)* LOW
    Privileges Required (PR)* LOW
    User Interaction (UI)* REQUIRED
    Scope (S)* CHANGED

l➤ Impact Metrics:
    Confidentiality Impact (C)* LOW
    Integrity Impact (I)* NONE
    Availability Impact (A)* NONE

Weakness Enumeration (CWE)

CWE-ID: CWE-79
CWE Name: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or Cross-site Scripting )
Source: Zoom Video Communications, Inc.

Common Attack Pattern Enumeration and Classification (CAPEC)

CAPEC-ID: CAPEC-153
CAPEC Description: CAPEC-153: Input Data Manipulation


Source: NVD (National Vulnerability Database).