CVE-2025-67460

7.8 HIGH

📋 TL;DR

A protection mechanism failure in Zoom Rooms for Windows allows unauthenticated local attackers to downgrade software versions and escalate privileges. This affects organizations using Zoom Rooms for Windows installations before version 6.6.0. The vulnerability requires physical or remote local access to the target system.

💻 Affected Systems

Products:
  • Zoom Rooms for Windows
Versions: All versions before 6.6.0
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Zoom Rooms installations, not standard Zoom client software. Requires local access to the system.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with local access could downgrade Zoom Rooms to a vulnerable version, then exploit known vulnerabilities in that older version to gain SYSTEM-level privileges and fully compromise the device.

🟠

Likely Case

An attacker with physical or remote desktop access could downgrade the software and gain elevated privileges to install malware, access sensitive data, or pivot to other systems on the network.

🟢

If Mitigated

With proper access controls and network segmentation, the impact is limited to the specific Zoom Rooms device, though it could still serve as an entry point for further network compromise.

🌐 Internet-Facing: LOW - This requires local access to the system, not remote exploitation over the internet.
🏢 Internal Only: HIGH - This is a local privilege escalation that could be exploited by anyone with physical access or remote desktop access to vulnerable Zoom Rooms installations.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability description indicates unauthenticated exploitation is possible via local access. No public exploit code has been reported as of the advisory.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.6.0 and later

Vendor Advisory: https://www.zoom.com/en/trust/security-bulletin/zsb-25050

Restart Required: Yes

Instructions:

1. Open Zoom Rooms controller. 2. Navigate to Settings > About. 3. Check current version. 4. If below 6.6.0, update through the Zoom admin portal or download latest version from Zoom website. 5. Restart the Zoom Rooms application after update.

🔧 Temporary Workarounds

Restrict Local Access

windows

Limit physical and remote access to Zoom Rooms devices to authorized personnel only.

Enable Windows Security Controls

windows

Implement Windows Defender Application Control or AppLocker to prevent unauthorized software execution.

🧯 If You Can't Patch

  • Isolate Zoom Rooms devices on a separate network segment with strict firewall rules
  • Implement strict physical security controls and limit user access to Zoom Rooms devices

🔍 How to Verify

Check if Vulnerable:

Check Zoom Rooms version in Settings > About. If version is below 6.6.0, the system is vulnerable.

Check Version:

Not applicable - check version through Zoom Rooms GUI Settings > About

Verify Fix Applied:

After updating, verify version is 6.6.0 or higher in Settings > About. Test that software downgrade attempts are blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected Zoom Rooms version changes
  • Failed update attempts
  • Unauthorized local login events

Network Indicators:

  • Unusual network traffic from Zoom Rooms devices
  • Connections to known malicious update servers

SIEM Query:

EventID=11707 OR EventID=11724 from Zoom Rooms logs showing version changes or update failures

🔗 References

📤 Share & Export