CVE-2023-43586 Overview
CVE-2023-43586 is a path traversal vulnerability affecting Zoom Desktop Client for Windows, Zoom VDI Client for Windows, and Zoom SDKs for Windows. This security flaw may allow an authenticated user to conduct an escalation of privilege via network access. The vulnerability stems from improper input validation that enables attackers to traverse directory structures and potentially access or modify files outside the intended scope.
Critical Impact
An authenticated attacker can exploit this path traversal vulnerability to escalate privileges on affected Windows systems, potentially gaining unauthorized access to sensitive system resources and compromising system integrity.
Affected Products
- Zoom Desktop Client for Windows
- Zoom VDI Client for Windows (Virtual Desktop Infrastructure)
- Zoom Meeting Software Development Kit for Windows
- Zoom Video Software Development Kit for Windows
Discovery Timeline
- 2023-12-13 - CVE-2023-43586 published to NVD
- 2024-11-21 - Last updated in NVD database
Technical Details for CVE-2023-43586
Vulnerability Analysis
This vulnerability is classified under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory - Path Traversal) and CWE-426 (Untrusted Search Path). The path traversal weakness allows authenticated users with network access to manipulate file paths in a way that escapes the intended directory boundaries. When successfully exploited, this can lead to privilege escalation on the affected Windows system.
The vulnerability requires authentication and network access to exploit, meaning an attacker must have valid credentials or session access to the Zoom application. Once authenticated, the attacker can craft malicious input containing path traversal sequences (such as ../ or equivalent encoded forms) to access files or directories outside the application's intended scope.
Root Cause
The root cause of CVE-2023-43586 lies in insufficient validation of file path inputs within the Zoom Windows clients and SDKs. When the application processes file paths provided through network interactions, it fails to properly sanitize or validate these inputs against directory traversal attempts. This allows specially crafted paths containing traversal sequences to bypass intended directory restrictions, potentially leading to access of sensitive system files or execution of operations with elevated privileges.
The secondary weakness (CWE-426 - Untrusted Search Path) indicates that the vulnerability may also involve improper handling of search paths, where the application loads resources from untrusted locations that an attacker can control.
Attack Vector
The attack is conducted over the network by an authenticated user. The attacker must first establish a valid authenticated session with the Zoom application. Once authenticated, they can send specially crafted requests containing path traversal sequences to access or manipulate files outside the intended directory structure.
The exploitation flow involves:
- Authenticating to the Zoom application through normal means
- Identifying input vectors that accept file paths
- Injecting path traversal sequences to escape the restricted directory
- Accessing sensitive files or executing privileged operations
Since no verified code examples are available for this vulnerability, organizations should refer to the Zoom Security Bulletin ZSB-23059 for technical details on the vulnerability mechanism and remediation guidance.
Detection Methods for CVE-2023-43586
Indicators of Compromise
- Unusual file access patterns within Zoom application directories containing path traversal sequences such as ../ or encoded variants like %2e%2e%2f
- Log entries showing attempts to access files outside the Zoom installation directory
- Unexpected privilege escalation events originating from Zoom processes
- Modified system files or configurations that coincide with Zoom client usage
Detection Strategies
- Monitor file system access from Zoom-related processes (Zoom.exe, ZoomVDI.exe) for attempts to access directories outside normal operational scope
- Implement endpoint detection rules to identify path traversal patterns in process command lines and file operations
- Review Windows Security Event logs for privilege escalation events correlated with Zoom application activity
- Deploy SentinelOne behavioral AI to detect anomalous file access patterns indicative of path traversal exploitation
Monitoring Recommendations
- Enable enhanced logging for Zoom client applications to capture detailed file access operations
- Configure SIEM rules to alert on path traversal patterns (../, ..\\, %2e%2e) in logs associated with Zoom processes
- Monitor for unexpected child processes spawned by Zoom applications that may indicate post-exploitation activity
- Implement file integrity monitoring on sensitive system directories to detect unauthorized modifications
How to Mitigate CVE-2023-43586
Immediate Actions Required
- Update all Zoom Desktop Client for Windows installations to the latest patched version immediately
- Update Zoom VDI Client for Windows deployments across all virtual desktop environments
- Upgrade Zoom Meeting SDK and Video SDK for Windows to patched versions in all applications utilizing these components
- Audit user access and authentication logs for any signs of exploitation prior to patching
Patch Information
Zoom has released security updates to address this vulnerability. Organizations should apply the patches referenced in the Zoom Security Bulletin ZSB-23059. The bulletin provides version-specific guidance for upgrading affected products:
- Zoom Desktop Client for Windows should be updated to the latest available version
- Zoom VDI Client for Windows should be updated across all VDI deployments
- Applications utilizing Zoom Meeting SDK or Video SDK for Windows should be rebuilt with the patched SDK versions
Workarounds
- Restrict network access to Zoom clients where possible until patches can be applied
- Implement application whitelisting to prevent execution of unauthorized binaries from Zoom directories
- Enable enhanced endpoint protection with behavioral analysis to detect exploitation attempts
- Consider deploying SentinelOne's real-time protection to monitor and block suspicious file operations from Zoom processes
# Configuration example - Check current Zoom Desktop Client version on Windows
# Run in PowerShell to identify installed version
Get-ItemProperty "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\*" | Where-Object { $_.DisplayName -like "*Zoom*" } | Select-Object DisplayName, DisplayVersion
# Alternative: Check Zoom VDI Client version
Get-ItemProperty "HKLM:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\*" | Where-Object { $_.DisplayName -like "*Zoom VDI*" } | Select-Object DisplayName, DisplayVersion
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


