Multiple vulnerabilities have been reported in Zoom products that could be exploited by an attacker to gain elevated privileges on the targeted system.
Target Audience:
All end-user organisations and individuals using Zoom applications.
Risk Assessment:
High risk of data manipulation and unauthorized access to sensitive information.
Impact Assessment:
Potential compromise of application integrity and service disruption.
The information provided herein is on "as is" basis, without warranty of any kind.