CVE-2023-34118

7.3 HIGH

📋 TL;DR

This vulnerability in Zoom Rooms for Windows allows authenticated users with local access to escalate privileges on the system. It affects organizations using Zoom Rooms software on Windows devices before version 5.14.5. The improper privilege management could let users gain higher permissions than intended.

💻 Affected Systems

Products:
  • Zoom Rooms for Windows
Versions: All versions before 5.14.5
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Zoom Rooms installations on Windows. Requires authenticated user access to the system.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker could gain SYSTEM/administrator privileges on the Windows host, potentially installing malware, accessing sensitive data, or taking full control of the device.

🟠

Likely Case

A malicious insider or compromised user account could elevate privileges to install unauthorized software, modify system settings, or access restricted data on the Zoom Rooms device.

🟢

If Mitigated

With proper access controls and monitoring, impact would be limited to the specific Zoom Rooms device rather than spreading across the network.

🌐 Internet-Facing: LOW - This requires local access to the Windows system, not remote exploitation over the internet.
🏢 Internal Only: HIGH - This is an internal privilege escalation vulnerability that could be exploited by anyone with physical or network access to the Zoom Rooms device.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to the Windows system. No public exploit code has been disclosed as of the advisory.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.14.5

Vendor Advisory: https://explore.zoom.us/en/trust/security/security-bulletin/

Restart Required: Yes

Instructions:

1. Open Zoom Rooms controller. 2. Navigate to Settings > About. 3. Check current version. 4. If below 5.14.5, update through Zoom admin portal or download latest version from Zoom website. 5. Restart the Zoom Rooms application after update.

🔧 Temporary Workarounds

Restrict Local Access

windows

Limit physical and network access to Zoom Rooms devices to authorized personnel only

Implement Least Privilege

windows

Ensure Zoom Rooms service accounts have minimal necessary permissions

🧯 If You Can't Patch

  • Isolate Zoom Rooms devices on separate network segments with strict access controls
  • Implement application whitelisting to prevent unauthorized software execution

🔍 How to Verify

Check if Vulnerable:

Check Zoom Rooms version in Settings > About. If version is below 5.14.5, the system is vulnerable.

Check Version:

Not applicable - check version through Zoom Rooms GUI interface

Verify Fix Applied:

Confirm Zoom Rooms version is 5.14.5 or higher in Settings > About.

📡 Detection & Monitoring

Log Indicators:

  • Unusual privilege escalation events in Windows Event Logs
  • Unexpected service or process creation with elevated privileges

Network Indicators:

  • Unusual outbound connections from Zoom Rooms devices
  • Attempts to access restricted network resources

SIEM Query:

EventID=4688 AND ProcessName LIKE '%zoom%' AND NewProcessName NOT LIKE '%zoom%' AND IntegrityLevel='System'

🔗 References

📤 Share & Export