CVE-2023-39201

7.2 HIGH

📋 TL;DR

This CVE describes an untrusted search path vulnerability in CleanZoom (Zoom's cleaning utility) that allows a privileged user to escalate privileges via local access. Attackers could place malicious files in locations where CleanZoom searches for dependencies, leading to arbitrary code execution. This affects systems running CleanZoom before the July 24, 2023 file date.

💻 Affected Systems

Products:
  • CleanZoom (Zoom cleaning utility)
Versions: All versions before file date 07/24/2023
Operating Systems: Windows, macOS, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires local access and some level of existing privileges to exploit. CleanZoom is typically installed alongside Zoom client software.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains SYSTEM/root privileges, installs persistent malware, accesses sensitive data, and pivots to other systems.

🟠

Likely Case

Privileged user (admin/root) exploits the vulnerability to maintain persistence, bypass security controls, or install additional malicious software.

🟢

If Mitigated

With proper access controls and monitoring, exploitation would be detected and contained before significant damage occurs.

🌐 Internet-Facing: LOW - This requires local access to the system, not remote exploitation.
🏢 Internal Only: HIGH - Local privilege escalation vulnerabilities are highly valuable for attackers who have gained initial access to a system.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access and some existing privileges. The attacker needs to understand the search path behavior and place malicious files in the correct locations.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: CleanZoom with file date 07/24/2023 or later

Vendor Advisory: https://explore.zoom.us/en/trust/security/security-bulletin/

Restart Required: No

Instructions:

1. Download the latest CleanZoom utility from Zoom's official website. 2. Run the installer to update CleanZoom. 3. Verify the file date is 07/24/2023 or later. 4. Remove any older versions of CleanZoom.

🔧 Temporary Workarounds

Remove CleanZoom

all

Uninstall CleanZoom if not needed, eliminating the attack surface entirely.

Windows: Control Panel > Programs > Uninstall CleanZoom
macOS: Drag CleanZoom to Trash or use uninstaller
Linux: Use package manager to remove cleanzoom package

Restrict File Permissions

all

Set strict permissions on directories CleanZoom searches to prevent malicious file placement.

Windows: icacls "C:\Program Files\CleanZoom" /deny Users:(OI)(CI)W
Linux: chmod 755 /opt/cleanzoom && chown root:root /opt/cleanzoom
macOS: chmod 755 /Applications/CleanZoom.app && chown root:wheel /Applications/CleanZoom.app

🧯 If You Can't Patch

  • Remove CleanZoom from all systems if patching is not possible.
  • Implement strict access controls to limit who can run CleanZoom and from which directories.

🔍 How to Verify

Check if Vulnerable:

Check CleanZoom file properties for creation/modification date. If before 07/24/2023, the system is vulnerable.

Check Version:

Windows: dir "C:\Program Files\CleanZoom\*" /T:C | find "CleanZoom"
macOS: ls -la /Applications/CleanZoom.app
Linux: ls -la /opt/cleanzoom/ 2>/dev/null || echo 'Not installed'

Verify Fix Applied:

Verify CleanZoom file date is 07/24/2023 or later. Check that no older versions exist on the system.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected CleanZoom process execution from non-standard locations
  • File creation in CleanZoom search paths by non-privileged users
  • CleanZoom loading DLLs or libraries from unexpected directories

Network Indicators:

  • None - this is a local privilege escalation vulnerability

SIEM Query:

process_name:"CleanZoom" AND (process_path:!"C:\\Program Files\\CleanZoom\\*" OR file_create_path:"*CleanZoom*")

🔗 References

📤 Share & Export