CVE-2025-58133

5.3 MEDIUM

📋 TL;DR

An authentication bypass vulnerability in Zoom Rooms Clients allows unauthenticated attackers to access sensitive information via network access. This affects organizations using Zoom Rooms software for conference room systems. The vulnerability enables unauthorized disclosure of potentially confidential data.

💻 Affected Systems

Products:
  • Zoom Rooms Clients
Versions: Versions before 6.5.1
Operating Systems: Windows, macOS, Linux (Zoom Rooms Appliance)
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Zoom Rooms software, not standard Zoom desktop or mobile clients. Requires network access to vulnerable system.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Unauthenticated attacker gains access to sensitive meeting information, participant data, or room configuration details from exposed Zoom Rooms systems.

🟠

Likely Case

Information disclosure of room status, meeting details, or configuration data that could facilitate further attacks or reconnaissance.

🟢

If Mitigated

Limited exposure due to network segmentation and proper access controls preventing external access to Zoom Rooms systems.

🌐 Internet-Facing: MEDIUM - If Zoom Rooms systems are directly exposed to the internet, attackers could exploit this without authentication.
🏢 Internal Only: LOW - Internal network access would still be required, reducing exposure to external threats.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

The vulnerability requires network access but no authentication, making it accessible to any attacker who can reach the vulnerable system.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.5.1 and later

Vendor Advisory: https://www.zoom.com/en/trust/security-bulletin/zsb-25039

Restart Required: No

Instructions:

1. Open Zoom Rooms Controller or Zoom Rooms Appliance web interface. 2. Navigate to Settings > Check for Updates. 3. Install version 6.5.1 or later. 4. Verify update completes successfully.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Zoom Rooms systems from untrusted networks to prevent external access.

Access Control Lists

all

Implement firewall rules to restrict access to Zoom Rooms systems to authorized IP addresses only.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Zoom Rooms from untrusted networks
  • Deploy network monitoring and intrusion detection for anomalous access attempts to Zoom Rooms systems

🔍 How to Verify

Check if Vulnerable:

Check Zoom Rooms version via controller interface or web portal. Versions below 6.5.1 are vulnerable.

Check Version:

On Zoom Rooms controller: Settings > About > Version

Verify Fix Applied:

Confirm Zoom Rooms version is 6.5.1 or higher in Settings > About or via web interface.

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated access attempts to Zoom Rooms API endpoints
  • Unusual information requests from unauthorized IP addresses

Network Indicators:

  • Unusual traffic patterns to Zoom Rooms systems from external sources
  • Information disclosure attempts via network protocols

SIEM Query:

source="zoom-rooms" AND (event_type="authentication_failure" OR event_type="unauthorized_access")

🔗 References

📤 Share & Export