Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64740: CWE-347 Improper Verification of Cryptographic Signature in Zoom Communications Inc. Zoom Workplace VDI Client

0
High
VulnerabilityCVE-2025-64740cvecve-2025-64740cwe-347
Published: Thu Nov 13 2025 (11/13/2025, 14:35:39 UTC)
Source: CVE Database V5
Vendor/Project: Zoom Communications Inc.
Product: Zoom Workplace VDI Client

Description

Improper verification of cryptographic signature in the installer for Zoom Workplace VDI Client for Windows may allow an authenticated user to conduct an escalation of privilege via local access.

AI-Powered Analysis

AILast updated: 11/13/2025, 14:57:27 UTC

Technical Analysis

CVE-2025-64740 is a vulnerability classified under CWE-347 (Improper Verification of Cryptographic Signature) affecting the Zoom Workplace VDI Client for Windows. The issue arises from the installer’s failure to correctly verify cryptographic signatures, which are intended to ensure the authenticity and integrity of the installation package. This improper verification can be exploited by an authenticated local user who has limited privileges to escalate their privileges on the system. The attack vector requires local access and user interaction, as the attacker must execute or manipulate the installer. The vulnerability impacts confidentiality, integrity, and availability by potentially allowing an attacker to execute arbitrary code with elevated privileges, thereby compromising the entire system. The CVSS v3.1 score of 7.5 reflects high severity, with attack vector Local (AV:L), attack complexity High (AC:H), privileges required Low (PR:L), user interaction Required (UI:R), and scope Changed (S:C). The vulnerability does not currently have known exploits in the wild, but the risk remains significant due to the critical nature of privilege escalation in enterprise environments. Zoom Workplace VDI Client is used in virtual desktop infrastructure setups, which are common in corporate environments to provide remote desktop access. The improper signature verification undermines the security model of the installer, making it possible for malicious actors with local access to bypass protections and gain higher privileges.

Potential Impact

For European organizations, this vulnerability poses a significant threat to enterprise security, particularly in sectors relying heavily on virtual desktop infrastructure (VDI) such as finance, healthcare, government, and large enterprises. Successful exploitation could lead to unauthorized access to sensitive communications, data leakage, and disruption of business operations. The escalation of privilege could allow attackers to install persistent malware, exfiltrate confidential information, or disrupt availability of critical communication tools. Given the widespread use of Zoom for remote collaboration and the increasing adoption of VDI solutions in Europe, the impact could be broad and severe. Organizations with less stringent local user access controls or delayed patch management processes are especially vulnerable. The vulnerability also raises compliance concerns under GDPR and other data protection regulations due to potential data breaches resulting from privilege escalation.

Mitigation Recommendations

1. Apply official patches from Zoom immediately once available to address the signature verification flaw. 2. Until patches are released, restrict local user permissions to the minimum necessary, preventing unprivileged users from executing or modifying the Zoom Workplace VDI Client installer. 3. Implement application whitelisting and integrity monitoring to detect unauthorized changes to installer files. 4. Enforce strict endpoint security policies, including limiting local administrative rights and using endpoint detection and response (EDR) tools to monitor suspicious installer activity. 5. Conduct regular audits of installed software and verify digital signatures manually if needed. 6. Educate users about the risks of executing untrusted installers and the importance of reporting unusual system behavior. 7. Use network segmentation to isolate VDI environments and reduce the attack surface. 8. Monitor security advisories from Zoom and cybersecurity authorities for updates and exploit reports.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Zoom
Date Reserved
2025-11-10T19:56:35.266Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6915ee5ff690f81e3c76b56f

Added to database: 11/13/2025, 2:42:39 PM

Last enriched: 11/13/2025, 2:57:27 PM

Last updated: 11/14/2025, 6:08:34 AM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats