Skip to main content Skip to local navigation

Zoom client Vulnerability (CVE-2025-49457)

 

A picture containing text  Description automatically generated

 

Service Advisory 


A new vulnerability has been identified in Zoom Clients for Windows (CVE-2025-49457) which could allow remote attackers to escalate privileges via an untrusted search path.

Severity level
:
CVSS Score: 9.6/Critical

Description
:
Zoom is a widely used video conferencing and collaboration platform. CVE-2025-49457 is an untrusted search path vulnerability arises from improper handling of DLL search paths in Zoom Clients for Windows. When the Zoom client loads dynamic link libraries without specifying absolute paths, Windows may load malicious DLLs placed in directories that are searched before legitimate ones. This flaw allows unauthenticated attackers to execute arbitrary code with the privileges of the Zoom application, potentially leading to full system compromise 

 

Affected Versions:
Zoom Workplace for Windows before version 6.3.10.
Zoom Workplace VDI for Windows before version 6.3.10 (excluding versions 6.1.16 and 6.2.12).
Zoom Rooms for Windows before version 6.3.10.
Zoom Rooms Controller for Windows before version 6.3.10.
Zoom Meeting SDK for Windows before version 6.3.10.

Impact:
Successful exploitation may result in result in full system compromise.

Resolution:
Please update to the following patched version: Zoom Clients for Windows version 6.3.10 or later.

Reference:

https://www.zoom.com/en/trust/security-bulletin/zsb-25030/?ampDeviceId=88bbbe3a-39c1-4b34-8b1f-1dc321ea2acc&ampSessionId=1755869051484&ampDeviceId=88bbbe3a-39c1-4b34-8b1f-1dc321ea2acc&ampSessionId=1755869051484

https://thehackernews.com/2025/08/zoom-and-xerox-release-critical.html

https://www.wiz.io/vulnerability-database/cve/cve-2025-49457

 

UIT Information Security

Contact

IT Client Services at askIT@yorku.ca or 416 736 5800

 

PRIVACY POLICY | VISIT WWW.YORKU.CA
This email was sent by: York University, 4700 Keele Street, Toronto, Ontario M3J 1P3

This email is viewed best in Microsoft Outlook for web