Zoom Releases Security Update Patching Multiple Vulnerabilities

Zoom has released a security update addressing several flaws in its software, including Zoom Workplace and various Windows and macOS clients.

The update fixes one high-severity issue and several medium-severity vulnerabilities.

Users are strongly urged to install the latest version immediately to protect against possible exploits.

High-Severity “Missing Authorization” Flaw

The most critical issue fixed in this release is CVE-2025-49459, a Missing Authorization vulnerability in Zoom Workplace for Windows on ARM.

This flaw could allow an attacker to perform actions without proper permission, potentially compromising sensitive data or system integrity.

Exploiting this bug requires only that the attacker interact with a vulnerable client, making it especially urgent to apply the patch.

In addition to CVE-2025-49459, this update covers a series of medium-severity vulnerabilities. Zoom has corrected two authorization issues in its Windows Workplace Clients.

CVE-2025-58135 is an Improper Action Enforcement vulnerability, while CVE-2025-58134 is an Incorrect Authorization flaw.

Both bugs could enable users to exceed allowed access levels and perform restricted operations.

Other medium-severity issues include a Buffer Overflow (CVE-2025-49458) that might lead to arbitrary code execution, an Argument Injection vulnerability (CVE-2025-49460) that lets attackers manipulate application behavior by inserting malicious parameters, and a Cross-site Scripting (XSS) flaw (CVE-2025-49461) that could allow script injection into web pages viewed by users.

Furthermore, Zoom patched a Race Condition vulnerability (CVE-2025-58131) in its VMware Horizon VDI Plugin for macOS Universal installer. Race conditions can cause unpredictable application behavior, including denial of service or privilege escalation.

CVE IdentifierVulnerability TypeAffected ComponentSeverity
CVE-2025-49459Missing AuthorizationZoom Workplace for Windows on ARMHigh
CVE-2025-58135Improper Action EnforcementZoom Workplace Client for WindowsMedium
CVE-2025-58134Incorrect AuthorizationZoom Workplace Client for WindowsMedium
CVE-2025-49458Buffer OverflowMultiple Zoom Workplace ClientsMedium
CVE-2025-49460Argument InjectionMultiple Zoom Workplace ClientsMedium
CVE-2025-49461Cross-site Scripting (XSS)Multiple Zoom Workplace ClientsMedium
CVE-2025-58131Race ConditionZoom Workplace VDI Plugin for macOSMedium

Urgent Recommendation and Context

Zoom consistently advises users to apply updates as soon as they become available to receive the latest security fixes and performance improvements.

This update arrives just one month after Zoom patched CVE-2025-49457, an Untrusted Search Path flaw in its Windows clients.

That issue carried a CVSS score of 9.6 and could allow an unauthenticated attacker to escalate privileges on a targeted system.

The recurrence of high-impact vulnerabilities underscores the risks of running outdated software.

Delaying updates can leave both individual and enterprise environments exposed to a variety of attacks, including data exfiltration, denial of service, and full system compromise.

To ensure protection, users should download the latest Zoom Workplace installer or update through the application’s built-in update feature.

IT administrators can also deploy the patched client across their networks using standard software distribution tools. Keeping Zoom clients current is crucial to maintaining secure, reliable communications in both personal and professional settings.

Find this Story Interesting! Follow us on Google NewsLinkedIn and X to Get More Instant Updates

AnuPriya
AnuPriya
Any Priya is a cybersecurity reporter at Cyber Press, specializing in cyber attacks, dark web monitoring, data breaches, vulnerabilities, and malware. She delivers in-depth analysis on emerging threats and digital security trends.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here