Multiple vulnerabilities have been reported in Zoom products that could be exploited by an attacker to gain elevated privileges or obtain sensitive information on the targeted system.
Target Audience:
All end-user organizations and individuals using Zoom applications.
Risk Assessment:
High risk of unauthorized access to sensitive data and system compromise.
Impact Assessment:
Potential for sensitive information disclosure and unauthorized access.
The information provided herein is on "as is" basis, without warranty of any kind.