Vulnerability Details : CVE-2023-39203
Uncontrolled resource consumption in Zoom Team Chat for Zoom Desktop Client for Windows and Zoom VDI Client may allow an unauthenticated user to conduct a disclosure of information via network access.
Products affected by CVE-2023-39203
- cpe:2.3:a:zoom:zoom:*:*:*:*:*:windows:*:*
- cpe:2.3:a:zoom:virtual_desktop_infrastructure:*:*:*:*:*:*:*:*
- cpe:2.3:a:zoom:virtual_desktop_infrastructure:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-39203
0.09%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 38 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-39203
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST | |
4.3
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L |
2.8
|
1.4
|
Zoom Video Communications, Inc. |
CWE ids for CVE-2023-39203
-
The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.Assigned by: security@zoom.us (Secondary)
-
The product allocates memory based on an untrusted, large size value, but it does not ensure that the size is within expected limits, allowing arbitrary amounts of memory to be allocated.Assigned by: security@zoom.us (Secondary)
References for CVE-2023-39203
-
https://explore.zoom.us/en/trust/security/security-bulletin/
Security Bulletin - ZoomVendor Advisory
Jump to