CVE-2020-9767: Zoom vulnerability

A vulnerability related to Dynamic-link Library (“DLL”) loading in the Zoom Sharing Service would allow an attacker who had local access to a machine on which the service was running with elevated privileges to elevate their system privileges as well through use of a malicious DLL. Zoom addressed this issue, which only applies to Windows users, in the 5.0.4 client release.

How to mitigate CVE-2020-9767

Time needed: 5 minutes.

Follow the instructions, as they will assist you in mitigating the Zoom vulnerability that been reported in CVE-2020-9767.

  1. Install the latest version of Zoom

    Navigate to the official Zoom website and download the latest version of Zoom. The latest version contains the CVE-2020-9767 fix.
    Update to the latest version

  2. Perform a vulnerability assessment

    Perform a scan on your Zoom environment(s), and check for vulnerabilities. Verify if CVE-2020-9767 has been mitigated.

  3. Utilize the references

    The CVE-2020-9767 references have been provided for a reason. Utilize these references and make sure that you are correctly informed.

References

  • support.zoom.us/hc/en-us/articles/360044350792-Security-CVE-2020-9767
  • Share this information