CVE-2023-34120

8.7 HIGH

📋 TL;DR

This vulnerability allows authenticated users on Windows systems to escalate privileges by leveraging Zoom client's elevated system permissions to spawn processes with higher privileges. It affects Zoom for Windows, Zoom Rooms for Windows, and Zoom VDI for Windows clients. Users with local access to vulnerable systems can potentially gain administrative control.

💻 Affected Systems

Products:
  • Zoom for Windows
  • Zoom Rooms for Windows
  • Zoom VDI for Windows
Versions: All versions before 5.14.0
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated local access to the Windows system. Zoom clients must be installed and running with elevated privileges maintained by the application.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with authenticated local access could gain full SYSTEM/administrator privileges, install malware, exfiltrate sensitive data, or establish persistent backdoors on the compromised system.

🟠

Likely Case

Malicious insiders or attackers who have gained initial access could escalate privileges to bypass security controls, install additional tools, or move laterally within the network.

🟢

If Mitigated

With proper endpoint security controls and least privilege principles, the impact is limited to the local system and cannot be exploited remotely without initial access.

🌐 Internet-Facing: LOW - This vulnerability requires local authenticated access and cannot be exploited directly over the internet.
🏢 Internal Only: HIGH - Internal users with local access to vulnerable systems can exploit this to gain elevated privileges, posing significant risk to internal networks.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated local access but appears straightforward once access is obtained. No public exploit code has been identified at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.14.0 and later

Vendor Advisory: https://explore.zoom.us/en/trust/security/security-bulletin/

Restart Required: Yes

Instructions:

1. Open Zoom client. 2. Click profile picture. 3. Select 'Check for Updates'. 4. Install version 5.14.0 or later. 5. Restart the Zoom client. For managed deployments, deploy the updated MSI package through your endpoint management system.

🔧 Temporary Workarounds

Remove Local Admin Rights

windows

Run Zoom client with standard user privileges instead of administrative rights to limit privilege escalation potential.

# Configure via Group Policy or endpoint management to run Zoom without admin rights

Application Control Restrictions

windows

Use application whitelisting to prevent unauthorized process spawning from Zoom executable.

# Configure Windows Defender Application Control or third-party application control solution

🧯 If You Can't Patch

  • Uninstall vulnerable Zoom versions from high-risk systems
  • Implement strict endpoint detection and response (EDR) monitoring for suspicious process spawning from Zoom executables

🔍 How to Verify

Check if Vulnerable:

Check Zoom client version in Settings > About. If version is below 5.14.0, the system is vulnerable.

Check Version:

wmic product where "name like 'Zoom%'" get version

Verify Fix Applied:

Confirm Zoom client version is 5.14.0 or higher in Settings > About. Test that Zoom functions normally without requiring administrative privileges for standard operations.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing Zoom.exe spawning processes with elevated privileges
  • Security logs showing unexpected privilege escalation events from Zoom context

Network Indicators:

  • Unusual outbound connections from Zoom processes to external IPs
  • Lateral movement attempts originating from systems running vulnerable Zoom versions

SIEM Query:

source="Windows Security" EventID=4688 ProcessName="*Zoom*" AND NewProcessName!="*Zoom*" AND IntegrityLevel="High"

🔗 References

📤 Share & Export