Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Zoom Vulnerabilities Let Attackers Bypass Access Controls to Access Session Data

Zoom Vulnerabilities Let Attackers Bypass Access Controls to Access Session Data

Posted on November 11, 2025November 11, 2025 By CWS

Zoom has issued a number of safety bulletins detailing patches for a number of vulnerabilities affecting its Office purposes.

The disclosures, revealed right this moment, spotlight two high-severity points alongside medium-rated flaws, underscoring the continuing challenges in securing video conferencing instruments utilized by thousands and thousands in hybrid work environments.

These updates come as cybersecurity specialists warn of accelerating exploitation makes an attempt on collaboration software program, probably exposing customers to unauthorized entry and system disruptions.​

Zoom Safety Vulnerabilities

Probably the most urgent issues stem from ZSB-25043 and ZSB-25042, each rated excessive severity. In Zoom Office for Android, an improper authorization dealing with flaw (CVE-2025-64741) might allow attackers to bypass entry controls, permitting unauthorized actions throughout the app, akin to becoming a member of conferences with out permission or accessing delicate session information.

This vulnerability impacts Android variations previous to the newest patch, the place flawed permission checks may let malicious actors manipulate consumer privileges over the community.

Equally, the Zoom Office VDI Shopper for Home windows suffers from improper verification of cryptographic signatures (CVE-2025-64740), opening doorways to assaults like accepting tampered updates or intercepting communications.

Safety researchers observe that such signature validation failures have traditionally led to provide chain compromises, the place attackers inject malware into legitimate-looking software program distributions.​

Complementing these are two medium-severity path manipulation vulnerabilities. ZSB-25041 impacts numerous Zoom Purchasers with exterior management of file identify or path (CVE-2025-64739), probably permitting adversaries to redirect file operations to unintended places, risking information leakage or arbitrary code execution if exploited in tandem with different flaws.

A parallel concern in Zoom Office for macOS (ZSB-25040, CVE-2025-64738) shares this danger, the place attackers might leverage crafted inputs to traverse directories and overwrite important information.

These path traversal bugs echo widespread internet app weaknesses however are tailored for desktop shoppers, emphasizing the necessity for sturdy enter sanitization in cross-platform instruments.​

Rounding out the bulletins is ZSB-25015, an up to date advisory from April 2025, now protecting null pointer dereferences in Zoom Office Apps for Home windows (CVE-2025-30670 and CVE-2025-30671).

Initially revealed on April 8 and revised on November 10, this medium-severity concern might trigger utility crashes or denial-of-service circumstances when the software program mishandles null references throughout processing.

Whereas circuitously exploitable for code execution, it highlights persistent stability issues in Home windows environments, the place repeated crashes may disrupt enterprise operations.​

Zoom urges quick updates to the newest variations throughout affected platforms, together with Android, Home windows, macOS, and VDI shoppers, to mitigate these dangers.

The corporate maintains its coverage of not disclosing exploitation particulars, focusing as a substitute on fast patching, however impartial analyses counsel these flaws might be chained for broader impacts like privilege escalation in enterprise settings.

As distant work persists, organizations ought to prioritize patch administration, allow multi-factor authentication, and monitor for anomalous app habits.​

This wave of bulletins follows a sample of frequent Zoom updates all through 2025, addressing over a dozen vulnerabilities since August, together with important untrusted search path points.

With CVEs assigned right this moment, the Nationwide Vulnerability Database is anticipated to supply additional scoring quickly, however early assessments peg the high-severity flaws at CVSS scores above 7.5. For customers, the message is evident: well timed updates stay the frontline protection in opposition to evolving threats in unified communications platforms.​

Comply with us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Access, Attackers, Bypass, Controls, Data, Session, Vulnerabilities, Zoom

Post navigation

Previous Post: SAP Security Update – Patch for Critical Vulnerabilities Allowing Code Execution and Injection Attacks
Next Post: Threat Actors Attacking Outlook and Google Bypassing Traditional Email Defenses

Related Posts

10-Year-Old Roundcube RCE Vulnerability Let Attackers Execute Malicious Code 10-Year-Old Roundcube RCE Vulnerability Let Attackers Execute Malicious Code Cyber Security News
Storm-0900 Hackers Leveraging Parking Ticket and Medical Test Themes in Massive Phishing Attack Storm-0900 Hackers Leveraging Parking Ticket and Medical Test Themes in Massive Phishing Attack Cyber Security News
Critical Kubernetes NFS Driver Flaw Exposes Server Risks Critical Kubernetes NFS Driver Flaw Exposes Server Risks Cyber Security News
Silver Fox Shifts Tactics to Python-Based Threats in Asia Silver Fox Shifts Tactics to Python-Based Threats in Asia Cyber Security News
Starkiller Phishing Tool Bypasses MFA with Real Login Pages Starkiller Phishing Tool Bypasses MFA with Real Login Pages Cyber Security News
Cisco IOS and IOS XE Software Vulnerabilities Let Attackers Execute Remote Code Cisco IOS and IOS XE Software Vulnerabilities Let Attackers Execute Remote Code Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker
  • Stocks in Cybersecurity Dip as Anthropic Tests Cutting-Edge AI

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker
  • Stocks in Cybersecurity Dip as Anthropic Tests Cutting-Edge AI

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark