Authentication Bypass and Command Injection Risks in Zoom Clients

Share:

On October 14, Zoom issued security updates that fix a total of two vulnerabilities in it’s Zoom Rooms, Zoom Workplace, Zoom Workplace VDI Client, and Zoom Meeting SDK. These vulnerabilities could be leveraged in targeted attacks or used as part of broader social engineering or lateral movement campaigns in enterprise environments.

Severity: Moderate

Vulnerability Details

1. CVE-2025-58132

  • CVSS Score: 4.1
  • Type: Command injection issue in Zoom Clients for Windows.
  • Description: The vulnerability stems from improper handling of inputs, which may allow an authenticated, remote attacker to execute arbitrary commands.
  • Impact: Successful exploitation could lead to information disclosure or potential privilege escalation.
  • Affected Products:
    • Zoom Workplace for Windows before version 6.5.5
    • Zoom Workplace VDI Client for Windows before version 6.3.15 and 6.4.13 in their respective tracks.
    • Zoom Rooms for Windows before version 6.5.5
    • Zoom Meeting SDK for Windows before version 6.5.5

2. CVE-2025-58133

  • CVSS Score: 5.3
  • Type: Authentication bypass issue in Zoom Rooms Clients
  • Description: The vulnerability stems from a weakness in the authentication mechanism of certain Zoom Rooms Client versions, likely an issue related to “weak authentication” (CWE-287).
  • Impact: Successful exploitation allows an unauthenticated remote actor to gain unauthorized access to sensitive configuration data or meeting metadata via network access.
  • Affected Products: Zoom Rooms (for Windows, macOS, Android, iOS, iPad) before version 6.5.1

Recommendations

  1. Users are advised to update their Zoom Rooms Clients to version 6.5.1 or later and Zoom Clients for Windows to 6.5.5 or higher.
  2. Ensure all installations follow Zoom’s automatic update policy.

Source:

Enjoyed reading this Threat Intelligence Advisory? Stay updated with our latest exclusive content by following us on Twitter and LinkedIn

No related posts found.

Ampcus Cyber
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.