Recent security disclosures reveal multiple high-severity vulnerabilities in Zoom’s client software, exposing millions of users to potential data breaches, privilege escalation, and unauthorized access.
The most critical flaws, patched in Zoom’s March 11, 2025, security bulletin, include CVE-2025-27440 (heap-based buffer overflow), CVE-2025-27439 (buffer underflow), CVE-2025-0151 (use-after-free), and CVE-2025-0150 (incorrect behavior order in iOS Workplace Apps), all rated high severity with CVSS scores ranging from 7.1 to 8.5.
These vulnerabilities affect Zoom’s desktop, mobile, and Workplace applications, enabling authenticated attackers to execute arbitrary code, corrupt memory, or bypass security protocols via network access.
This flaw occurs when Zoom Apps write excess data to a memory buffer, overwriting adjacent memory regions. Attackers exploiting this vulnerability could inject malicious code into systems running Zoom Workplace Apps, particularly on Windows and macOS.
For instance, a crafted network packet could trigger a heap overflow, allowing privilege escalation from standard user to administrator-level access.
A buffer underflow in Zoom Apps arises when operations read more data from a buffer than it contains, potentially crashing the application or exposing sensitive memory contents.
This could facilitate denial-of-service (DoS) attacks or data leakage in meetings using outdated clients.
This memory corruption flaw occurs when Zoom Apps reference a memory address after it has been deallocated.
Attackers could manipulate the freed memory to execute code, compromise meeting encryption keys, or access user credentials.
Zoom Workplace Apps for iOS improperly sequence security checks, enabling attackers to intercept authentication tokens or meeting metadata before validation completes.
This vulnerability could expose enterprise-level data in hybrid work environments.
The medium-severity CVE-2025-0149 (CVSS 6.5) allows unprivileged users to send malformed network packets that bypass authenticity checks, triggering DoS conditions.
This vulnerability highlights systemic weaknesses in Zoom’s data validation protocols, affecting Workplace Apps across platforms
Impacted software includes:
Zoom’s security team has released patches but avoids detailing exploit scenarios or customer-specific impacts.
The company advises all users to upgrade to Zoom Client 6.2.0 or later, which includes fixes for 12 vulnerabilities disclosed in March 2025 alone.
Zoom’s latest vulnerabilities highlight the fragility of widely adopted communication platforms in an era of sophisticated cyberattacks.
While the company has responded swiftly with patches, the recurrence of memory corruption and input validation flaws suggests more profound architectural challenges.
As remote work persists, proactive vulnerability management remains non-negotiable.
Are you from SOC/DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free.
The Federal Bureau of Investigation's Internet Crime Complaint Center (IC3) has revealed unprecedented financial damages…
ESET, a global leader in cybersecurity solutions, has announced a significant enhancement to its ESET…
The dark web has rapidly become a central hub for cybercriminal activity, where stolen data,…
A massive power outage struck the Iberian Peninsula on April 28, 2025, plunging millions of…
A sophisticated new red team tool called RedExt has recently been released, combining a Manifest…
Cybersecurity has rapidly evolved from a back-office technical concern to a boardroom imperative. As digital…