![]() ![]() A local low-privileged user could exploit this vulnerability in an attack chain during the installation process to escalate their privileges to privileges to root. Zoom Client for IT Admin macOS installers before version 5.13.5 contain a local privilege escalation vulnerability. This could result in an attacker gaining access to a user's device and data, and remote code execution. If a victim saves a local recording to an SMB location and later opens it using a link from Zoom’s web portal, an attacker positioned on an adjacent network to the victim client could set up a malicious SMB server to respond to client requests, causing the client to execute attacker controlled executables. Zoom clients prior to 5.13.5 contain an improper trust boundary implementation vulnerability. ![]()
0 Comments
Leave a Reply. |