Uncategorized

Zoom for Windows Vulnerabilities Leaves Users Open to DoS Attacks

A critical buffer overflow vulnerabilities in multiple Zoom clients for Windows that could enable authorized users to launch denial-of-service attacks through network access.

The vulnerabilities, tracked as CVE-2025-49464 and CVE-2025-46789, both carry a medium severity rating with CVSS scores of 6.5, highlighting significant security concerns for organizations relying on Zoom’s communication platform.

These classic buffer overflow vulnerabilities affect numerous Zoom products including Workplace, VDI, Rooms, and Meeting SDK implementations, requiring immediate attention from IT administrators and users to prevent potential service disruptions.

Two distinct but similarly structured vulnerabilities have been uncovered in Zoom’s Windows client software, both representing classic buffer overflow conditions that pose substantial security risks.

CVE-2025-49464 and CVE-2025-46789 share identical CVSS vector strings (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H), indicating that both vulnerabilities can be exploited remotely with low attack complexity by authenticated users without requiring user interaction.

The technical nature of these buffer overflow vulnerabilities suggests that malicious actors could potentially cause memory corruption by sending specially crafted network packets to vulnerable Zoom clients.

While the vulnerabilities do not appear to compromise confidentiality or integrity of data, they pose a significant availability threat, enabling attackers to render Zoom services unusable through targeted denial-of-service attacks.

The fact that both vulnerabilities require only low-level privileges for exploitation makes them particularly concerning for enterprise environments where multiple users have access to Zoom services.

Both security vulnerabilities were responsibly disclosed by security researcher fre3dm4n, demonstrating the importance of collaborative security research in identifying and addressing software vulnerabilities before they can be exploited maliciously.

The consistent reporting source and similar vulnerability characteristics suggest these may be related issues within Zoom’s codebase that require comprehensive remediation efforts.

Zoom for Windows Vulnerabilities

The scope of these vulnerabilities extends across Zoom’s entire Windows product ecosystem, affecting critical business communication tools used by millions of organizations worldwide. The impact can be broken down as follows:

CVE-2025-49464 affects:

  • Zoom Workplace for Windows versions prior to 6.4.0.
  • Zoom Workplace VDI for Windows before version 6.3.10 (with exceptions for versions 6.1.7 and 6.2.15).
  • Zoom Rooms for Windows before version 6.4.0.
  • Zoom Rooms Controller for Windows before version 6.4.0.
  • Zoom Meeting SDK for Windows versions preceding 6.4.0.

CVE-2025-46789 affects:

  • Zoom Workplace for Windows versions prior to 6.4.5.
  • Zoom Workplace VDI for Windows before version 6.3.12 (except version 6.2.15).
  • Zoom Rooms for Windows before version 6.4.5.
  • Zoom Rooms Controller for Windows before version 6.4.5.
  • Zoom Meeting SDK for Windows versions preceding 6.4.5.

The overlapping but distinct version requirements indicate that organizations may need to implement multiple update cycles to fully address both vulnerabilities, particularly if they are running different Zoom products with varying version levels.

User Recommendations

Zoom has responded promptly to these security discoveries by releasing updated versions that address both vulnerabilities across their Windows product suite.

The company strongly recommends that all users immediately download and install the latest updates.

Organizations should prioritize updating all Zoom Windows clients to the latest available versions, implementing systematic patch management procedures to ensure comprehensive coverage across their entire Zoom deployment.

IT administrators should conduct thorough inventories of all Zoom products in use and verify that each installation meets or exceeds the minimum secure version requirements for both identified vulnerabilities.

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.

Ethan Brooks

Ethan Brooks is a Senior cybersecurity journalist passionate about threat intelligence and data privacy. His work highlights cyber attacks, hacking, security culture, and cybercrime with The Cyber News.

Recent Posts

Burp Suite Supercharges Its Scanning Capabilities With React2Shell Vulnerability Detection

PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…

4 months ago

Malicious MCP Servers Enable New Prompt Injection Attack To Drain Resources

Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…

4 months ago

Law Enforcement Detains Hackers Equipped With Specialized Flipper Hacking Tools

Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…

4 months ago

Google Unveils 10 New Gemini-Powered AI Features For Chrome

Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…

4 months ago

CISA Alerts On Actively Exploited Buffer Overflow Flaw In D-Link Routers

Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…

4 months ago

Over 500 Apache Tika Toolkit Instances Exposed To Critical XXE Vulnerability

Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…

4 months ago