Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:zoom:sharing_service:5.0.4:*:*:*:*:windows:*:*", "matchCriteriaId": "30485B07-6AD9-470D-82F3-F60B3F4FFA40", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "A vulnerability related to Dynamic-link Library (\u201cDLL\u201d) loading in the Zoom Sharing Service would allow an attacker who had local access to a machine on which the service was running with elevated privileges to elevate their system privileges as well through use of a malicious DLL. Zoom addressed this issue, which only applies to Windows users, in the 5.0.4 client release."}, {"lang": "es", "value": "Una vulnerabilidad relacionada con la Carga de una Biblioteca de Enlace Din\u00e1mico (\"DLL\") en el servicio Zoom Sharing podr\u00eda permitir a un atacante que tuviera acceso local a una m\u00e1quina en la que se estaba ejecutando el servicio con privilegios elevados elevar sus privilegios system, as\u00ed como tambi\u00e9n mediante el uso de una DLL maliciosa. Zoom corrigi\u00f3 este problema, que solo se aplica a los usuarios de Windows, en la versi\u00f3n del cliente 5.0.4."}], "id": "CVE-2020-9767", "lastModified": "2024-11-21T05:41:14.287", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0"}, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2020-08-14T18:15:12.723", "references": [{"source": "cve@mitre.org", "tags": ["Broken Link", "Vendor Advisory"], "url": "https://support.zoom.us/hc/en-us/articles/360044350792-Security-CVE-2020-9767"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Broken Link", "Vendor Advisory"], "url": "https://support.zoom.us/hc/en-us/articles/360044350792-Security-CVE-2020-9767"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-427"}], "source": "nvd@nist.gov", "type": "Primary"}]}