Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Critical Zoom Clients for Windows Vulnerability Lets Attackers Escalate Privileges

Posted on August 12, 2025August 12, 2025 By CWS

Zoom has disclosed a essential vulnerability affecting a number of Home windows-based shoppers, doubtlessly permitting attackers to escalate privileges and compromise person programs.

Designated as CVE-2025-49457 below bulletin ZSB-25030, this flaw carries a CVSS rating of 9.6, classifying it as essential as a result of its excessive impression on confidentiality, integrity, and availability.

The vulnerability stems from an untrusted search path in sure Zoom Shoppers for Home windows. This situation permits an unauthenticated attacker to take advantage of the flaw over a community, requiring solely person interplay reminiscent of clicking a malicious hyperlink or opening a tainted file.

The CVSS vector string, CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H, highlights the benefit of assault: no privileges are wanted, complexity is low, and it will possibly change the scope of impression, resulting in excessive dangers of knowledge theft, system tampering, or full takeover.

Affected merchandise embody Zoom Office for Home windows earlier than model 6.3.10, Zoom Office VDI for Home windows earlier than 6.3.10 (excluding variations 6.1.16 and 6.2.12), Zoom Rooms for Home windows earlier than 6.3.10, Zoom Rooms Controller for Home windows earlier than 6.3.10, and Zoom Assembly SDK for Home windows earlier than 6.3.10. Customers operating these outdated variations are urged to replace instantly to mitigate dangers.

Zoom Shoppers for Home windows Vulnerability

Found and reported by Zoom’s Offensive Safety staff, this vulnerability underscores ongoing challenges in software program safety, significantly with path-handling mechanisms in Home windows environments.

Untrusted search paths happen when purposes load recordsdata from insecure directories, permitting malicious actors to inject dangerous DLLs or executables.

In Zoom’s case, this might allow privilege escalation, the place an attacker positive factors elevated entry, doubtlessly putting in malware, accessing delicate knowledge, or disrupting companies.

The implications are extreme for Zoom’s huge person base, which incorporates companies, educators, and people counting on the platform for digital conferences.

With distant work nonetheless prevalent in 2025, such flaws might result in widespread breaches, eroding belief in video conferencing instruments. Specialists word that comparable vulnerabilities have plagued software program up to now, usually exploited in provide chain assaults or phishing campaigns.

Zoom has responded swiftly, advising customers to obtain the most recent updates from its official website. “Making use of these patches is essential for sustaining safety,” a Zoom spokesperson said. Further protecting measures embody enabling computerized updates, utilizing antivirus software program, and avoiding suspicious hyperlinks.

This incident highlights the significance of proactive safety practices. As cyber threats evolve, common updates and vigilance stay key defenses in opposition to exploitation. Organizations ought to evaluation their Zoom deployments and educate customers on protected practices to stop potential incidents.

Enhance your SOC and assist your staff shield your enterprise with free top-notch risk intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Attackers, Clients, Critical, Escalate, Lets, Privileges, Vulnerability, Windows, Zoom

Post navigation

Previous Post: Inside the Dark Web’s Access Economy: How Hackers Sell the Keys to Enterprise Networks
Next Post: Cybercrime Groups ShinyHunters, Scattered Spider Join Forces in Extortion Attacks on Businesses

Related Posts

20 Years old Proxy Botnet Network Dismantled That Exploits 1000 Unique Unpatched Devices Weekly Cyber Security News
Ransomware 2.0 How AI-Powered Attacks Are Evolving Cyber Security News
Halo Security Achieves SOC 2 Type 1 Compliance Cyber Security News
Kali GPT- AI Assistant That Transforms Penetration Testing on Kali Linux Cyber Security News
Microsoft Teams New Meeting Join Bar Reminds You to Join Meeting On-time Cyber Security News
US Confirms Shutdown of BlackSuit Ransomware That Hacked Over 450 Organizations Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Patch Tuesday August 2025 Released
  • Fortinet SSL VPNs Hit by Global Brute-Force Wave Before Attackers Shift to FortiManager
  • How to Solve Alert Fatigue in Your SOC without Extra Staff or Effort
  • Cybercrime Groups ShinyHunters, Scattered Spider Join Forces in Extortion Attacks on Businesses
  • Critical Zoom Clients for Windows Vulnerability Lets Attackers Escalate Privileges

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Patch Tuesday August 2025 Released
  • Fortinet SSL VPNs Hit by Global Brute-Force Wave Before Attackers Shift to FortiManager
  • How to Solve Alert Fatigue in Your SOC without Extra Staff or Effort
  • Cybercrime Groups ShinyHunters, Scattered Spider Join Forces in Extortion Attacks on Businesses
  • Critical Zoom Clients for Windows Vulnerability Lets Attackers Escalate Privileges

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News