Open Nav
Sign Up

Zoom Tackles Critical Security flaws Head-On with New Patches

OPInnovate Research

August 17, 2023

Keeping our online conversations safe is a big deal, and Zoom knows it. The popular video call service recently rolled out fixes to patch up some security holes that were found in its software. Whether you’re using Zoom on your Windows PC, Mac, Linux system, iPhone, Android device, or even in Zoom Rooms, these updates are all about ensuring you can chat and meet online without worrying about unwanted security surprises.

Critical Flaws and Solutions

  1. The Trouble with Improper Input Validation – (CVE-2023-39209, CVE-2023-39216, CVE-2023-39217)
  • Severity: CVSS scores of 5.9, 9.6, 5.
  • Impact: These vulnerabilities could have enabled both authenticated and unauthenticated attackers to exploit improper input validation in the Zoom Windows client. The potential risk includes information leakage or unauthorized privilege escalation
  1. Exposure of Delicate Information – (CVE-2023-39214)
  • Severity: CVSS score of 7.6
  • Impact: This vulnerability in the Zoom Client SDK exposed sensitive data, which could have been used by an attacker to induce a denial of service. Its wide-reaching nature across various platforms emphasized the necessity for immediate action.
  1. Privilege Mismanagement and Untrusted Search Paths – (CVE-2023-39211, CVE-2023-39212, CVE-2023-36540)
  • Severity: CVSS scores of 8.8, 7.9, 7.3
  • Impact: Authenticated users could misuse privileges, reveal data, or launch denial of service attacks within various Windows applications of Zoom.
  1. Escalation of Privileges and Additional Threats – (CVE-2023-36534, CVE-2023-36541, CVE-2023-39213)
  • Severity: CVSS scores of 9.3, 8.0, 9.6
  • Impact: Other significant vulnerabilities include path traversal and inadequate verification of data authenticity in Zoom’s Windows client, which could lead to unauthorized privilege escalation.

Additional Concerns

Zoom has also addressed vulnerabilities linked to clear text storage of sensitive information, client-side enforcement of server-side security, uncontrolled resource consumption, and buffer overflow. The diversity in the security flaws and their corresponding resolutions underlines the complexity of modern cybersecurity and Zoom’s dedication to tackling these challenges.

How to Secure Your Zoom Experience

If you’re a Zoom user, updating your software to the latest version is paramount. This step ensures that you’re protected from these vulnerabilities and helps maintain the privacy and security of your communications.

Visit Zoom’s official website to download the most recent update. Cybersecurity is an ever-evolving landscape, and being proactive is key to staying one step ahead of potential threats. Don’t delay; update today!

Resources highlights

Docker Issues Patch for Critical Exploit in Docker Desktop: CVE-2025-9074

On August 20, 2025, Docker released an urgent patch for CVE-2025-9074, a critical Server-Side Request Forgery (SSRF) vulnerability (CVSS 9.3) affecting Docker Desktop for Windows…

Read more >

CVE-2025-9074

CVE-2025-48384: Git Submodule Path Flaw Exploited in the Wild

CVE-2025-48384 is a client-side Git vulnerability that lets a malicious repository abuse a mismatch in how Git reads vs. writes configuration values containing a trailing…

Read more >

CVE-2025-48384

CVE-2025-43300: Apple ImageIO Zero-Day Exploited in Targeted Attacks

Apple patched CVE-2025-43300, a zero-day in the ImageIO framework used system-wide to read/write many image formats. Opening or previewing a malicious image can corrupt memory…

Read more >

CVE-2025-43300

CVE-2025-57790: Commvault Path Traversal Vulnerability Leads to RCE

On August 19th, Commvault published advisory CV_2025_08_2 for a newly-discovered path traversal flaw in the Web Server component that allows remote attackers to perform unauthorized…

Read more >

CVE-2025-57790

CVE-2025-20265: Cisco Secure Firewall Management Center (FMC) RADIUS Pre-Auth RCE

A critical (CVSS 10.0)  input-handling flaw in the RADIUS authentication subsystem of Cisco Secure Firewall Management Center (FMC), tracked as CVE-2025-20265 allows unauthenticated remote code…

Read more >

CVE-2025-20265

5 Signs You’ve Outgrown Your Current Pentest Provider

As a CISO, CTO, or security leader, you understand the value of regular penetration testing. However, as your company scales and your security program matures,…

Read more >

5 signs PT provider
Under Cyber Attack?

Fill out the form and we will contact you immediately.