CVE-2023-43585
📋 TL;DR
This vulnerability in Zoom Mobile App for iOS and Zoom SDKs for iOS allows authenticated users to access information they shouldn't have permission to view via network connections. It affects users running Zoom iOS versions before 5.16.5 who are logged into their accounts.
💻 Affected Systems
- Zoom Mobile App for iOS
- Zoom SDKs for iOS
📦 What is this software?
Zoom by Zoom
⚠️ Risk & Real-World Impact
Worst Case
Authenticated attackers could access sensitive meeting data, chat history, or user information that should be protected by access controls.
Likely Case
Users with legitimate Zoom accounts could accidentally or intentionally access information from meetings or groups they weren't invited to.
If Mitigated
With proper access controls and updated software, users can only access information they're explicitly authorized to view.
🎯 Exploit Status
Exploitation requires authenticated user access and understanding of Zoom's API/network protocols.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 5.16.5 and later
Vendor Advisory: https://www.zoom.com/en/trust/security-bulletin/ZSB-23058/
Restart Required: Yes
Instructions:
1. Open the App Store on iOS device. 2. Search for 'Zoom'. 3. Tap 'Update' if available, or ensure version is 5.16.5+. 4. Restart the Zoom app after update.
🔧 Temporary Workarounds
Restrict Zoom Access
allLimit Zoom app usage to trusted networks only and monitor for unusual access patterns.
🧯 If You Can't Patch
- Implement network segmentation to isolate Zoom traffic and monitor for unauthorized data access
- Enforce strict access controls and audit user permissions within Zoom organization settings
🔍 How to Verify
Check if Vulnerable:
Check Zoom app version in iOS Settings > General > iPhone Storage > Zoom, or open Zoom app > tap profile > About Zoom
Check Version:
Not applicable for iOS apps - use manual version check in app settings
Verify Fix Applied:
Confirm Zoom app version is 5.16.5 or higher using the same method
📡 Detection & Monitoring
Log Indicators:
- Unusual API calls to Zoom endpoints
- Access patterns showing users accessing meetings/groups they shouldn't have permissions for
Network Indicators:
- Abnormal data transfer volumes from Zoom app
- Requests to Zoom APIs with unexpected parameters
SIEM Query:
source="zoom" AND (event_type="unauthorized_access" OR user_activity="unusual_pattern")