CVE-2025-67461: CWE-73: External Control of File Name or Path in Zoom Communications Inc. Zoom Rooms
External control of file name or path in Zoom Rooms for macOS before version 6.6.0 may allow an authenticated user to conduct a disclosure of information via local access.
AI Analysis
Technical Summary
CVE-2025-67461 is a vulnerability classified under CWE-73 (External Control of File Name or Path) affecting Zoom Rooms for macOS versions before 6.6.0. This flaw allows an authenticated user with local access to manipulate file names or paths used by the application, potentially leading to unauthorized disclosure of sensitive information stored or processed by Zoom Rooms. The vulnerability requires user interaction and privileges equivalent to a standard authenticated user on the local machine, making remote exploitation infeasible. The attack complexity is low, as the attacker only needs to control file path inputs to trigger information disclosure. The vulnerability impacts confidentiality by exposing sensitive data but does not affect integrity or availability of the system. The CVSS v3.1 base score is 5.0, reflecting a medium severity level due to the limited scope and required conditions for exploitation. No patches or known exploits have been reported at the time of publication, but organizations should monitor for updates from Zoom. The vulnerability highlights the risks of improper file path validation and the importance of secure handling of user-controlled inputs within local applications.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to confidentiality, as sensitive information handled by Zoom Rooms on macOS devices could be disclosed to unauthorized local users. This is particularly relevant in environments where multiple users share devices or where insider threats exist. The impact is limited by the need for local authenticated access and user interaction, reducing the likelihood of widespread exploitation. However, organizations relying heavily on Zoom Rooms for meetings, presentations, or collaboration in regulated sectors such as finance, healthcare, or government may face compliance and data privacy challenges if sensitive data is exposed. The vulnerability does not compromise system integrity or availability, so operational disruption is unlikely. Nevertheless, the potential leakage of confidential meeting content or credentials could lead to reputational damage and secondary attacks. European entities should assess their macOS device usage policies and local user privilege management to mitigate risks.
Mitigation Recommendations
Organizations should implement strict local user access controls on macOS devices running Zoom Rooms, limiting authenticated user privileges to the minimum necessary. Until an official patch is released, avoid sharing devices among multiple users and restrict local user accounts to trusted personnel only. Monitor Zoom Rooms usage and audit local file system access to detect unusual file path manipulations. Employ endpoint security solutions that can detect anomalous behavior related to file operations. Educate users about the risks of interacting with untrusted files or inputs within Zoom Rooms. Once Zoom releases a patch for version 6.6.0 or later, prioritize timely updates to eliminate the vulnerability. Additionally, consider isolating Zoom Rooms environments or using virtualized macOS instances to reduce exposure. Regularly review and update security policies regarding local application usage and file system permissions to prevent similar vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-67461: CWE-73: External Control of File Name or Path in Zoom Communications Inc. Zoom Rooms
Description
External control of file name or path in Zoom Rooms for macOS before version 6.6.0 may allow an authenticated user to conduct a disclosure of information via local access.
AI-Powered Analysis
Technical Analysis
CVE-2025-67461 is a vulnerability classified under CWE-73 (External Control of File Name or Path) affecting Zoom Rooms for macOS versions before 6.6.0. This flaw allows an authenticated user with local access to manipulate file names or paths used by the application, potentially leading to unauthorized disclosure of sensitive information stored or processed by Zoom Rooms. The vulnerability requires user interaction and privileges equivalent to a standard authenticated user on the local machine, making remote exploitation infeasible. The attack complexity is low, as the attacker only needs to control file path inputs to trigger information disclosure. The vulnerability impacts confidentiality by exposing sensitive data but does not affect integrity or availability of the system. The CVSS v3.1 base score is 5.0, reflecting a medium severity level due to the limited scope and required conditions for exploitation. No patches or known exploits have been reported at the time of publication, but organizations should monitor for updates from Zoom. The vulnerability highlights the risks of improper file path validation and the importance of secure handling of user-controlled inputs within local applications.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to confidentiality, as sensitive information handled by Zoom Rooms on macOS devices could be disclosed to unauthorized local users. This is particularly relevant in environments where multiple users share devices or where insider threats exist. The impact is limited by the need for local authenticated access and user interaction, reducing the likelihood of widespread exploitation. However, organizations relying heavily on Zoom Rooms for meetings, presentations, or collaboration in regulated sectors such as finance, healthcare, or government may face compliance and data privacy challenges if sensitive data is exposed. The vulnerability does not compromise system integrity or availability, so operational disruption is unlikely. Nevertheless, the potential leakage of confidential meeting content or credentials could lead to reputational damage and secondary attacks. European entities should assess their macOS device usage policies and local user privilege management to mitigate risks.
Mitigation Recommendations
Organizations should implement strict local user access controls on macOS devices running Zoom Rooms, limiting authenticated user privileges to the minimum necessary. Until an official patch is released, avoid sharing devices among multiple users and restrict local user accounts to trusted personnel only. Monitor Zoom Rooms usage and audit local file system access to detect unusual file path manipulations. Employ endpoint security solutions that can detect anomalous behavior related to file operations. Educate users about the risks of interacting with untrusted files or inputs within Zoom Rooms. Once Zoom releases a patch for version 6.6.0 or later, prioritize timely updates to eliminate the vulnerability. Additionally, consider isolating Zoom Rooms environments or using virtualized macOS instances to reduce exposure. Regularly review and update security policies regarding local application usage and file system permissions to prevent similar vulnerabilities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Zoom
- Date Reserved
- 2025-12-08T13:59:49.274Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6939dceba97935729e774097
Added to database: 12/10/2025, 8:49:47 PM
Last enriched: 12/10/2025, 9:05:24 PM
Last updated: 12/11/2025, 2:56:21 AM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13764: CWE-269 Improper Privilege Management in ApusTheme WP CarDealer
CriticalCVE-2025-11467: CWE-918 Server-Side Request Forgery (SSRF) in themeisle RSS Aggregator by Feedzy – Feed to Post, Autoblogging, News & YouTube Video Feeds Aggregator
MediumUsing AI Gemma 3 Locally with a Single CPU , (Wed, Dec 10th)
MediumCVE-2025-67720: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Mayuri-Chan pyrofork
MediumCVE-2025-67719: CWE-620: Unverified Password Change in ibexa user
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.