Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:zoom:it_installer:*:*:*:*:*:windows:*:*", "matchCriteriaId": "F2593BC4-619F-4358-B10C-D07C748E73DF", "versionEndExcluding": "4.6.10", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "The Zoom IT installer for Windows (ZoomInstallerFull.msi) prior to version 4.6.10 deletes files located in %APPDATA%\\Zoom before installing an updated version of the client. Standard users are able to write to this directory, and can write links to other directories on the machine. As the installer runs with SYSTEM privileges and follows these links, a user can cause the installer to delete files that otherwise cannot be deleted by the user."}, {"lang": "es", "value": "El instalador it zoom para windows, (ZoomInstallerFull.msi) anterior a la versi\u00f3n 4.6.10 elimina ficheros localizados en %APPDATA%\\Zoom antes de instalar una actualizaci\u00f3n de la versi\u00f3n del cliente. Los usuarios comunes pueden escribir en el directorio, y puede escribir links a otros directorios en la m\u00e1quina. As\u00ed el instalador dirige con privilegios SYSTEM y sigue estos links, un usuario puede causar que al instalador que elimine los ficheros que de otra manera no pueden ser eliminados por nosotros."}], "id": "CVE-2020-11443", "lastModified": "2024-11-21T04:57:55.607", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 8.5, "confidentialityImpact": "NONE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:C/A:C", "version": "2.0"}, "exploitabilityScore": 8.0, "impactScore": 9.2, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2020-05-04T14:15:13.137", "references": [{"source": "cve@mitre.org", "tags": ["Broken Link", "Vendor Advisory"], "url": "https://support.zoom.us/hc/en-us/articles/201361953-New-Updates-for-Windows"}, {"source": "cve@mitre.org", "tags": ["Broken Link", "Vendor Advisory"], "url": "https://support.zoom.us/hc/en-us/articles/360043036451"}, {"source": "cve@mitre.org", "tags": ["Broken Link", "Vendor Advisory"], "url": "https://support.zoom.us/hc/en-us/articles/360043036451-Security-CVE-2020-11443"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Broken Link", "Vendor Advisory"], "url": "https://support.zoom.us/hc/en-us/articles/201361953-New-Updates-for-Windows"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Broken Link", "Vendor Advisory"], "url": "https://support.zoom.us/hc/en-us/articles/360043036451"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Broken Link", "Vendor Advisory"], "url": "https://support.zoom.us/hc/en-us/articles/360043036451-Security-CVE-2020-11443"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-59"}, {"lang": "en", "value": "CWE-732"}], "source": "nvd@nist.gov", "type": "Primary"}]}