Zoom Rooms for Windows and macOS Face Privilege Escalation and Data Leak Risks

Critical Vulnerabilities in Zoom Rooms for Windows and macOS Expose Systems to Privilege Escalation and Data Leaks

Zoom has recently identified and disclosed two significant security vulnerabilities within its Zoom Rooms software for both Windows and macOS platforms. These vulnerabilities, cataloged as ZSB-25050 and ZSB-25051, could potentially allow attackers with local access to escalate their privileges or access sensitive information without authorization. Organizations utilizing Zoom Rooms for conference setups, especially in shared environments like boardrooms or huddle spaces, are at an increased risk due to these flaws.

Windows Vulnerability: Software Downgrade Protection Failure (ZSB-25050)

The first vulnerability, identified as ZSB-25050 and assigned CVE-2025-67460, affects Zoom Rooms for Windows versions prior to 6.6.0. This high-severity flaw arises from a failure in the software’s downgrade protection mechanism. An unauthenticated local user could exploit this weakness to escalate their privileges, potentially gaining elevated control over the system. The vulnerability has been assigned a CVSS score of 7.8, indicating a significant risk to affected systems.

macOS Vulnerability: External Control of File Names (ZSB-25051)

The second vulnerability, known as ZSB-25051 and assigned CVE-2025-67461, impacts Zoom Rooms for macOS versions before 6.6.0. This medium-severity issue stems from improper external control of file names or paths. An authenticated user could exploit this flaw to disclose sensitive information. While this vulnerability requires user interaction, it poses a risk of confidential data exposure in enterprise deployments. The CVSS score for this vulnerability is 5.0.

Recommendations and Mitigation

Zoom strongly recommends that all users update their Zoom Rooms software to version 6.6.0 or later to mitigate these vulnerabilities. The latest versions can be downloaded from Zoom’s official download page. As of now, there is no evidence of these vulnerabilities being actively exploited. However, the local-access nature of these flaws makes them particularly concerning for insider threats or compromised endpoints.

Implications for Enterprises

These vulnerabilities underscore the ongoing security challenges associated with collaboration tools, especially in the context of hybrid work environments. Enterprises should take the following steps to enhance their security posture:

– Audit Zoom Rooms Deployments: Regularly review and assess all Zoom Rooms installations to ensure they are up-to-date and configured securely.

– Enforce Least-Privilege Access: Implement strict access controls to limit user privileges to the minimum necessary for their roles, reducing the potential impact of any security breaches.

– Monitor for Downgrade Attempts: Establish monitoring mechanisms to detect and prevent any attempts to downgrade software versions, which could reintroduce known vulnerabilities.

Conclusion

The disclosure of these vulnerabilities highlights the critical importance of maintaining up-to-date software and implementing robust security measures in enterprise environments. By promptly updating to the latest versions and adhering to best security practices, organizations can mitigate the risks associated with these flaws and ensure the integrity and confidentiality of their systems and data.