CVE-2025-64738

5.0 MEDIUM

📋 TL;DR

This vulnerability in Zoom Workplace for macOS allows an authenticated user with local access to control file names or paths, potentially leading to information disclosure. It affects macOS users running Zoom Workplace versions before 6.5.10. The attacker must already have authenticated access to the system.

💻 Affected Systems

Products:
  • Zoom Workplace
Versions: All versions before 6.5.10
Operating Systems: macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects macOS version of Zoom Workplace. Requires authenticated user with local access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated malicious user could manipulate file paths to access sensitive system files or user data stored outside intended directories, potentially exposing credentials, configuration files, or other confidential information.

🟠

Likely Case

An authenticated user with local access could read files they shouldn't normally access by manipulating file paths in Zoom Workplace's operations, leading to unauthorized information disclosure.

🟢

If Mitigated

With proper access controls and least privilege principles, the impact is limited as the attacker must already have authenticated access and can only affect files accessible to the Zoom process.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access and knowledge of local file system. No public exploit code has been disclosed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.5.10

Vendor Advisory: https://www.zoom.com/en/trust/security-bulletin/zsb-25040

Restart Required: Yes

Instructions:

1. Open Zoom Workplace on macOS. 2. Click your profile picture. 3. Select 'Check for Updates'. 4. If update to 6.5.10 is available, click 'Update'. 5. Restart Zoom Workplace after installation completes.

🔧 Temporary Workarounds

Restrict local user access

all

Limit which users have authenticated access to systems running vulnerable Zoom Workplace versions

🧯 If You Can't Patch

  • Implement strict file system permissions and access controls to limit what files Zoom process can access
  • Monitor for unusual file access patterns from Zoom Workplace process

🔍 How to Verify

Check if Vulnerable:

Check Zoom Workplace version in macOS: Open Zoom Workplace → Click profile picture → About Zoom → Check version number

Check Version:

On macOS terminal: /Applications/zoom.us.app/Contents/MacOS/zoom.us --version

Verify Fix Applied:

Verify version is 6.5.10 or higher using same method as checking vulnerability

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns by Zoom process
  • Failed file access attempts outside normal directories

Network Indicators:

  • Not applicable - local vulnerability

SIEM Query:

process_name:"zoom.us" AND (file_access:* OR file_read:*) AND NOT file_path:"/Applications/zoom.us.app/*"

🔗 References

📤 Share & Export