Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64740: CWE-347 Improper Verification of Cryptographic Signature in Zoom Communications Inc. Zoom Workplace VDI Client

0
High
VulnerabilityCVE-2025-64740cvecve-2025-64740cwe-347
Published: Thu Nov 13 2025 (11/13/2025, 14:35:39 UTC)
Source: CVE Database V5
Vendor/Project: Zoom Communications Inc.
Product: Zoom Workplace VDI Client

Description

Improper verification of cryptographic signature in the installer for Zoom Workplace VDI Client for Windows may allow an authenticated user to conduct an escalation of privilege via local access.

AI-Powered Analysis

AILast updated: 11/20/2025, 15:05:57 UTC

Technical Analysis

CVE-2025-64740 is a vulnerability classified under CWE-347, indicating improper verification of cryptographic signatures in the Zoom Workplace VDI Client installer for Windows. The flaw arises because the installer does not correctly validate the cryptographic signature of components during installation, allowing an authenticated local user to bypass security controls. This improper verification can be exploited to escalate privileges on the affected system, potentially granting administrative rights to a user with initially limited access. The vulnerability requires local access and some user interaction, with a high attack complexity, as indicated by the CVSS vector (AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially compromised component. The impact on confidentiality, integrity, and availability is high, as an attacker could gain full control over the system. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk due to the widespread use of Zoom Workplace VDI Client in enterprise environments. The lack of published patches at the time of disclosure necessitates immediate attention to mitigate potential exploitation. Organizations should monitor vendor communications for updates and prepare to deploy fixes promptly.

Potential Impact

For European organizations, this vulnerability could lead to severe security breaches, especially in environments relying on Zoom Workplace VDI Client for remote work and virtual desktop infrastructure. Successful exploitation allows attackers to escalate privileges locally, potentially leading to unauthorized access to sensitive corporate data, disruption of services, and lateral movement within networks. The high confidentiality, integrity, and availability impact means that critical business operations could be compromised. Given the increasing reliance on VDI solutions in Europe due to remote work trends, this vulnerability could affect sectors such as finance, healthcare, government, and technology. The risk is amplified in organizations with less stringent local user access controls or where endpoint security monitoring is insufficient. Additionally, the vulnerability could undermine trust in virtual collaboration tools, impacting productivity and compliance with data protection regulations like GDPR.

Mitigation Recommendations

1. Monitor Zoom Communications Inc. for official patches addressing CVE-2025-64740 and apply them immediately upon release. 2. Restrict local user permissions rigorously to minimize the number of users with authenticated local access capable of exploiting the vulnerability. 3. Implement application whitelisting and integrity monitoring to detect unauthorized modifications to the Zoom Workplace VDI Client installer or related components. 4. Employ endpoint detection and response (EDR) solutions to identify suspicious privilege escalation attempts and anomalous installer behavior. 5. Conduct regular audits of local user accounts and remove or disable unnecessary accounts to reduce attack surface. 6. Educate users about the risks of interacting with untrusted installers or software components, emphasizing the need for caution even with authenticated access. 7. Use network segmentation to limit the impact of a compromised endpoint and prevent lateral movement. 8. Prepare incident response plans specifically addressing local privilege escalation scenarios within VDI environments.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Zoom
Date Reserved
2025-11-10T19:56:35.266Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6915ee5ff690f81e3c76b56f

Added to database: 11/13/2025, 2:42:39 PM

Last enriched: 11/20/2025, 3:05:57 PM

Last updated: 2/7/2026, 1:06:37 PM

Views: 233

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats