Updating Microsoft Edge WebView2 Runtime to at least version 1.0 and restarting Zoom remediates this vulnerability by updating Microsoft’s telemetry behavior. ![]() Updating Zoom remediates this vulnerability by disabling the feature. A recent update to the Microsoft Edge WebView2 runtime used by the affected Zoom clients, transmitted text to Microsoft’s online Spellcheck service instead of the local Windows Spellcheck. Zoom for Windows clients before version 5.13.3, Zoom Rooms for Windows clients before version 5.13.5 and Zoom VDI for Windows clients before 5.13.1 contain an information disclosure vulnerability. ![]() A malicious actor could send specially crafted UDP traffic to a victim Zoom client to remotely cause the client to crash, causing a denial of service. Zoom clients before version 5.13.5 contain a STUN parsing vulnerability. A local low-privileged user could exploit this vulnerability in an attack chain during the installation process to escalate their privileges to the SYSTEM user. ![]() Zoom Client for IT Admin Windows installers before version 5.13.5 contain a local privilege escalation vulnerability.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |