Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Zoom and Xerox Release Critical Security Updates Fixing Privilege Escalation and RCE Flaws

Posted on August 13, 2025August 13, 2025 By CWS

Aug 13, 2025Ravie LakshmananVulnerability / Software program Safety

Zoom and Xerox have addressed vital safety flaws in Zoom Shoppers for Home windows and FreeFlow Core that would permit privilege escalation and distant code execution.
The vulnerability impacting Zoom Shoppers for Home windows, tracked as CVE-2025-49457 (CVSS rating: 9.6), pertains to a case of an untrusted search path that would pave the way in which for privilege escalation.
“Untrusted search path in sure Zoom Shoppers for Home windows might permit an unauthenticated person to conduct an escalation of privilege by way of community entry,” Zoom stated in a safety bulletin on Tuesday.
The problem, reported by its personal Offensive Safety staff, impacts the next merchandise –

Zoom Office for Home windows earlier than model 6.3.10
Zoom Office VDI for Home windows earlier than model 6.3.10 (besides 6.1.16 and 6.2.12)
Zoom Rooms for Home windows earlier than model 6.3.10
Zoom Rooms Controller for Home windows earlier than model 6.3.10
Zoom Assembly SDK for Home windows earlier than model 6.3.10

The disclosure comes as a number of vulnerabilities have been disclosed in Xerox FreeFlow Core, probably the most extreme of which may end in distant code execution. The problems, which have been addressed in model 8.0.4, embody –

CVE-2025-8355 (CVSS rating: 7.5) – XML Exterior Entity (XXE) injection vulnerability resulting in server-side request forgery (SSRF)
CVE-2025-8356 (CVSS rating: 9.8) – Path traversal vulnerability resulting in distant code execution

“These vulnerabilities are rudimentary to use and if exploited, may permit an attacker to execute arbitrary instructions on the affected system, steal delicate information, or try to maneuver laterally right into a given company surroundings to additional their assault,” Horizon3.ai stated.

The Hacker News Tags:Critical, Escalation, Fixing, Flaws, Privilege, RCE, Release, Security, Updates, Xerox, Zoom

Post navigation

Previous Post: Chipmaker Patch Tuesday: Many Vulnerabilities Addressed by Intel, AMD, Nvidia
Next Post: New Multi-Stage Tycoon2FA Phishing Attack Now Beats Top Security Systems

Related Posts

Hackers Exploit SharePoint Zero-Day Since July 7 to Steal Keys, Maintain Persistent Access The Hacker News
Popular Chrome Extensions Leak API Keys, User Data via HTTP and Hardcoded Credentials The Hacker News
Why Traditional DLP Solutions Fail in the Browser Era The Hacker News
What the Next Wave of AI Cyberattacks Will Look Like — And How to Survive The Hacker News
The Silent Drivers Behind 2025’s Worst Breaches The Hacker News
5 BCDR Essentials for Effective Ransomware Defense The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Passkey Login Bypassed via WebAuthn Process Manipulation
  • ShinyHunters Possibly Collaborates With Scattered Spider in Salesforce Attack Campaigns
  • “AI-Induced Destruction” – Helpful Tools Become Accidental Weapons
  • Google Requires Crypto App Licenses in 15 Regions as FBI Warns of $9.9M Scam Losses
  • What Is Out-of-Bounds Read and Write Vulnerability?

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Passkey Login Bypassed via WebAuthn Process Manipulation
  • ShinyHunters Possibly Collaborates With Scattered Spider in Salesforce Attack Campaigns
  • “AI-Induced Destruction” – Helpful Tools Become Accidental Weapons
  • Google Requires Crypto App Licenses in 15 Regions as FBI Warns of $9.9M Scam Losses
  • What Is Out-of-Bounds Read and Write Vulnerability?

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News