{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2023-28597","assignerOrgId":"99b9af0d-a833-4a5d-9e2f-8b1324f35351","assignerShortName":"Zoom","dateUpdated":"2025-02-19T15:27:48.810Z","dateReserved":"2023-03-17T00:00:00.000Z","datePublished":"2023-03-27T00:00:00.000Z"},"containers":{"cna":{"title":"Improper trust boundary implementation for SMB in Zoom Clients","datePublic":"2023-03-14T00:00:00.000Z","providerMetadata":{"orgId":"99b9af0d-a833-4a5d-9e2f-8b1324f35351","shortName":"Zoom","dateUpdated":"2023-03-27T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"Zoom clients prior to 5.13.5 contain an improper trust boundary implementation vulnerability. If a victim saves a local recording to an SMB location and later opens it using a link from Zoom’s web portal, an attacker positioned on an adjacent network to the victim client could set up a malicious SMB server to respond to client requests, causing the client to execute attacker controlled executables. This could result in an attacker gaining access to a user's device and data, and remote code execution."}],"affected":[{"vendor":"Zoom Video Communications Inc","product":"Zoom (for Android, iOS, Linux, macOS, and Windows)","versions":[{"version":"unspecified","lessThan":"5.13.5","status":"affected","versionType":"custom"}]},{"vendor":"Zoom Video Communications Inc","product":"Zoom Rooms (for Android, iOS, Linux, macOS, and Windows)","versions":[{"version":"unspecified","lessThan":"5.13.5","status":"affected","versionType":"custom"}]},{"vendor":"Zoom Video Communications Inc","product":"Zoom VDI for Windows","versions":[{"version":"unspecified","lessThan":"5.13.10","status":"affected","versionType":"custom"}]}],"references":[{"url":"https://explore.zoom.us/en/trust/security/security-bulletin/"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H","attackVector":"ADJACENT_NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.3,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-501: Trust Boundary Violation","cweId":"CWE-501"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"discovery":"INTERNAL"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T13:43:22.755Z"},"title":"CVE Program Container","references":[{"url":"https://explore.zoom.us/en/trust/security/security-bulletin/","tags":["x_transferred"]}]},{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-501","lang":"en","description":"CWE-501 Trust Boundary Violation"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-02-19T15:26:38.358743Z","id":"CVE-2023-28597","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-02-19T15:27:48.810Z"}}]}}