![]() ![]() Updating Microsoft Edge WebView2 Runtime to at least version 1.0 and restarting Zoom remediates this vulnerability by updating Microsoft’s telemetry behavior. ![]() Updating Zoom remediates this vulnerability by disabling the feature. A recent update to the Microsoft Edge WebView2 runtime used by the affected Zoom clients, transmitted text to Microsoft’s online Spellcheck service instead of the local Windows Spellcheck. Source: Reported by Zoom Offensive Security TeamĬVSS Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:Nĭescription: Zoom for Windows clients before version 5.13.3, Zoom Rooms for Windows clients before version 5.13.5 and Zoom VDI for Windows clients before 5.13.1 contain an information disclosure vulnerability. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |