CVE-2023-43590

7.8 HIGH

📋 TL;DR

This vulnerability in Zoom Rooms for macOS allows authenticated users with local access to escalate privileges through improper link following. Attackers could gain higher system permissions than intended. Only macOS Zoom Rooms installations before version 5.16.0 are affected.

💻 Affected Systems

Products:
  • Zoom Rooms for macOS
Versions: All versions before 5.16.0
Operating Systems: macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires local access and authenticated user credentials. Zoom Rooms installations on macOS only.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker gains root privileges on the macOS system, enabling complete system compromise, data theft, and persistence.

🟠

Likely Case

Local authenticated user escalates to administrative privileges, potentially installing malware, accessing sensitive data, or modifying system configurations.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to unauthorized privilege escalation attempts that can be detected and contained.

🌐 Internet-Facing: LOW - This vulnerability requires local access and authenticated user credentials.
🏢 Internal Only: HIGH - Internal users with local access to Zoom Rooms systems can exploit this to gain elevated privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated local access and knowledge of the vulnerability. No public exploit code is known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.16.0

Vendor Advisory: https://explore.zoom.us/en/trust/security/security-bulletin/

Restart Required: Yes

Instructions:

1. Open Zoom Rooms client on macOS. 2. Navigate to Settings > About. 3. Check for updates and install version 5.16.0 or later. 4. Restart the Zoom Rooms application after installation.

🔧 Temporary Workarounds

Restrict Local Access

all

Limit physical and remote local access to Zoom Rooms systems to authorized personnel only.

Implement Least Privilege

all

Ensure Zoom Rooms runs with minimal necessary privileges and users have only required access levels.

🧯 If You Can't Patch

  • Isolate Zoom Rooms systems on separate network segments with strict access controls.
  • Implement enhanced monitoring for privilege escalation attempts and unusual user activity.

🔍 How to Verify

Check if Vulnerable:

Check Zoom Rooms version in Settings > About. If version is below 5.16.0, the system is vulnerable.

Check Version:

Open Zoom Rooms, go to Settings > About to view version number.

Verify Fix Applied:

Confirm Zoom Rooms version is 5.16.0 or higher in Settings > About after update.

📡 Detection & Monitoring

Log Indicators:

  • Unusual privilege escalation events in system logs
  • Zoom Rooms process running with unexpected privileges
  • Failed or successful authentication attempts followed by privilege changes

Network Indicators:

  • Unusual network connections from Zoom Rooms system
  • Traffic patterns suggesting lateral movement from Zoom Rooms host

SIEM Query:

source="zoom_rooms_logs" AND (event_type="privilege_escalation" OR process_elevation="true")

🔗 References

📤 Share & Export