
Cloud Vulnerability DB
A community-led vulnerabilities database
Client-side enforcement of server-side security in Zoom clients before version 5.14.10 may allow an authenticated user to enable information disclosure via network access (NVD, CVE).
The vulnerability has been assigned a CVSS v3.1 base score of 6.5 (MEDIUM) by NIST with the vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N. However, Zoom Video Communications assessed it with a higher CVSS score of 7.1 (HIGH) with the vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L (NVD).
The vulnerability primarily affects confidentiality, with a potential for information disclosure through network access. The vulnerability requires authentication but no user interaction for exploitation (NVD).
Users are advised to update their Zoom clients to version 5.14.10 or later to address this vulnerability. This affects multiple Zoom products including Zoom Rooms for various platforms (Android, iPad OS, macOS, Windows) and Zoom Virtual Desktop Infrastructure (ManageEngine).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."