Lucene search

K
openvasCopyright (C) 2023 Greenbone AGOPENVAS:1361412562310149878
HistoryJul 05, 2023 - 12:00 a.m.

Zoom Client < 5.13.5 Cryptographic Signature Verification Vulnerability (ZSB-23010) - Windows

2023-07-0500:00:00
Copyright (C) 2023 Greenbone AG
plugins.openvas.org
8
zoom
client
cryptographic
signature
verification
vulnerability
windows
downgrade
update
security bulletin

CVSS3

7.7

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N

AI Score

7

Confidence

Low

EPSS

0.001

Percentile

17.5%

Zoom Client is prone to a cryptographic signature verification
vulnerability.

# SPDX-FileCopyrightText: 2023 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

CPE = "cpe:/a:zoom:zoom";

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.149878");
  script_version("2023-10-13T16:09:03+0000");
  script_tag(name:"last_modification", value:"2023-10-13 16:09:03 +0000 (Fri, 13 Oct 2023)");
  script_tag(name:"creation_date", value:"2023-07-05 04:40:54 +0000 (Wed, 05 Jul 2023)");
  script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:S/C:N/I:C/A:N");
  script_tag(name:"severity_vector", value:"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N");
  script_tag(name:"severity_origin", value:"NVD");
  script_tag(name:"severity_date", value:"2023-06-21 20:53:00 +0000 (Wed, 21 Jun 2023)");

  script_cve_id("CVE-2023-28602");

  script_tag(name:"qod_type", value:"executable_version");

  script_tag(name:"solution_type", value:"VendorFix");

  script_name("Zoom Client < 5.13.5 Cryptographic Signature Verification Vulnerability (ZSB-23010) - Windows");

  script_category(ACT_GATHER_INFO);

  script_copyright("Copyright (C) 2023 Greenbone AG");
  script_family("General");
  script_dependencies("gb_zoom_client_smb_login_detect.nasl");
  script_mandatory_keys("zoom/client/win/detected");

  script_tag(name:"summary", value:"Zoom Client is prone to a cryptographic signature verification
  vulnerability.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");

  script_tag(name:"insight", value:"Zoom for Windows clients contain an improper verification of
  cryptographic signature vulnerability. A malicious user may potentially downgrade Zoom Client
  components to previous versions.");

  script_tag(name:"affected", value:"Zoom Client prior to version 5.13.5.");

  script_tag(name:"solution", value:"Update to version 5.13.5 or later.");

  script_xref(name:"URL", value:"https://explore.zoom.us/en/trust/security/security-bulletin/");

  exit(0);
}

include("host_details.inc");
include("version_func.inc");

if (!infos = get_app_version_and_location(cpe: CPE, exit_no_version: TRUE))
  exit(0);

version = infos["version"];
location = infos["location"];

if (version_is_less(version: version, test_version: "5.13.5")) {
  report = report_fixed_ver(installed_version: version, fixed_version: "5.13.5", install_path: location);
  security_message(port: 0, data: report);
  exit(0);
}

exit(99);

CVSS3

7.7

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N

AI Score

7

Confidence

Low

EPSS

0.001

Percentile

17.5%

Related for OPENVAS:1361412562310149878