{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-30T11:00:16.371","vulnerabilities":[{"cve":{"id":"CVE-2020-11443","sourceIdentifier":"cve@mitre.org","published":"2020-05-04T14:15:13.137","lastModified":"2024-11-21T04:57:55.607","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Zoom IT installer for Windows (ZoomInstallerFull.msi) prior to version 4.6.10 deletes files located in %APPDATA%\\Zoom before installing an updated version of the client. Standard users are able to write to this directory, and can write links to other directories on the machine. As the installer runs with SYSTEM privileges and follows these links, a user can cause the installer to delete files that otherwise cannot be deleted by the user."},{"lang":"es","value":"El instalador it zoom para windows, (ZoomInstallerFull.msi)  anterior a la versión 4.6.10 elimina  ficheros localizados en %APPDATA%\\Zoom antes de instalar una actualización de la versión del cliente. Los usuarios comunes pueden escribir en el directorio, y puede escribir links a otros directorios en la máquina. Así el instalador dirige con privilegios SYSTEM y sigue estos links, un usuario puede causar que al instalador que elimine los ficheros que de otra manera no pueden ser eliminados por nosotros."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.2}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:N/I:C/A:C","baseScore":8.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":8.0,"impactScore":9.2,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-59"},{"lang":"en","value":"CWE-732"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:zoom:it_installer:*:*:*:*:*:windows:*:*","versionEndExcluding":"4.6.10","matchCriteriaId":"F2593BC4-619F-4358-B10C-D07C748E73DF"}]}]}],"references":[{"url":"https://support.zoom.us/hc/en-us/articles/201361953-New-Updates-for-Windows","source":"cve@mitre.org","tags":["Broken Link","Vendor Advisory"]},{"url":"https://support.zoom.us/hc/en-us/articles/360043036451","source":"cve@mitre.org","tags":["Broken Link","Vendor Advisory"]},{"url":"https://support.zoom.us/hc/en-us/articles/360043036451-Security-CVE-2020-11443","source":"cve@mitre.org","tags":["Broken Link","Vendor Advisory"]},{"url":"https://support.zoom.us/hc/en-us/articles/201361953-New-Updates-for-Windows","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Vendor Advisory"]},{"url":"https://support.zoom.us/hc/en-us/articles/360043036451","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Vendor Advisory"]},{"url":"https://support.zoom.us/hc/en-us/articles/360043036451-Security-CVE-2020-11443","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Vendor Advisory"]}]}}]}