Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"state": "PUBLISHED", "cveId": "CVE-2023-22880", "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "dateUpdated": "2025-02-26T20:12:41.573Z", "dateReserved": "2023-01-09T00:00:00.000Z", "datePublished": "2023-03-16T00:00:00.000Z"}, "containers": {"cna": {"title": "Information Disclosure in Zoom for Windows Clients", "datePublic": "2023-03-14T00:00:00.000Z", "providerMetadata": {"orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom", "dateUpdated": "2023-03-16T00:00:00.000Z"}, "descriptions": [{"lang": "en", "value": "Zoom for Windows clients before version 5.13.3, Zoom Rooms for Windows clients before version 5.13.5 and Zoom VDI for Windows clients before 5.13.1 contain an information disclosure vulnerability. A recent update to the Microsoft Edge WebView2 runtime used by the affected Zoom clients, transmitted text to Microsoft\u2019s online Spellcheck service instead of the local Windows Spellcheck. Updating Zoom remediates this vulnerability by disabling the feature. Updating Microsoft Edge WebView2 Runtime to at least version 109.0.1481.0 and restarting Zoom remediates this vulnerability by updating Microsoft\u2019s telemetry behavior."}], "affected": [{"vendor": "Zoom Video Communications Inc", "product": "Zoom for Windows", "versions": [{"version": "unspecified", "lessThan": "5.13.3", "status": "affected", "versionType": "custom"}]}, {"vendor": "Zoom Video Communications Inc", "product": "Zoom Rooms for Windows", "versions": [{"version": "unspecified", "lessThan": "5.13.3", "status": "affected", "versionType": "custom"}]}, {"vendor": "Zoom Video Communications Inc", "product": "Zoom VDI for Windows", "versions": [{"version": "unspecified", "lessThan": "5.13.1", "status": "affected", "versionType": "custom"}]}], "references": [{"url": "https://explore.zoom.us/en/trust/security/security-bulletin/"}], "metrics": [{"cvssV3_1": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM"}}], "problemTypes": [{"descriptions": [{"type": "CWE", "lang": "en", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "cweId": "CWE-200"}]}], "x_generator": {"engine": "Vulnogram 0.0.9"}, "source": {"discovery": "INTERNAL"}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-02T10:20:31.179Z"}, "title": "CVE Program Container", "references": [{"url": "https://explore.zoom.us/en/trust/security/security-bulletin/", "tags": ["x_transferred"]}]}, {"metrics": [{"other": {"type": "ssvc", "content": {"timestamp": "2025-02-26T20:12:31.429873Z", "id": "CVE-2023-22880", "options": [{"Exploitation": "none"}, {"Automatable": "no"}, {"Technical Impact": "partial"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2025-02-26T20:12:41.573Z"}}]}}