Impact
Zoom Workplace Clients for Windows contain an improper check of the minimum required version during the update process. The flaw allows an authenticated local user to trigger the update mechanism in a way that bypasses the expected version validation, giving the user the ability to elevate privileges on the affected system.
Affected Systems
The vulnerability impacts Zoom Communications Inc. Zoom Workplace clients for Windows. No specific affected version range is listed in the provided information.
Risk and Exploitability
The CVSS score of 7.8 indicates a high severity for potential exploitation. The EPSS score is reported as less than 1%, suggesting a low probability of active exploitation in the wild, and the vulnerability is not listed in the CISA KEV catalog. Attackers must be authenticated and have local access to the victim machine, making the primary attack vector local. Given that the flaw permits escalation of privilege, the resulting impact could allow a local attacker to gain elevated permissions, potentially compromising system integrity and all user data on the host.
OpenCVE Enrichment