Skip to main content

CVE-2025-30665: CWE-476 NULL Pointer Dereference in Zoom Communications, Inc Zoom Workplace Apps for Windows

Medium
VulnerabilityCVE-2025-30665cvecve-2025-30665cwe-476
Published: Wed May 14 2025 (05/14/2025, 17:35:06 UTC)
Source: CVE
Vendor/Project: Zoom Communications, Inc
Product: Zoom Workplace Apps for Windows

Description

NULL pointer dereference in some Zoom Workplace Apps for Windows may allow an authenticated user to conduct a denial of service via network access.

AI-Powered Analysis

AILast updated: 07/06/2025, 13:42:39 UTC

Technical Analysis

CVE-2025-30665 is a vulnerability identified in Zoom Communications, Inc's Zoom Workplace Apps for Windows. The issue is classified as a NULL pointer dereference (CWE-476), which occurs when the application attempts to access or dereference a pointer that has a NULL value. This flaw can lead to a denial of service (DoS) condition, causing the affected application to crash or become unresponsive. The vulnerability requires an authenticated user to exploit it, and the attack vector is network-based, meaning the attacker can trigger the fault remotely over the network without user interaction. The CVSS v3.1 base score is 6.5, indicating a medium severity level, with the vector string AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H. This means the attack can be carried out remotely (network), with low attack complexity, requires privileges (authenticated user), no user interaction, unchanged scope, no impact on confidentiality or integrity, but a high impact on availability. There are no known exploits in the wild at the time of publication, and no patches have been linked yet. The vulnerability affects certain versions of Zoom Workplace Apps for Windows, though exact versions are not specified in the provided data. The NULL pointer dereference could be triggered by sending crafted network requests to the application, causing it to crash and deny service to legitimate users. This could disrupt business communications and workflows relying on Zoom Workplace Apps, especially in environments where uptime and availability are critical.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to the availability of Zoom Workplace Apps for Windows. Given the widespread use of Zoom for internal communications, collaboration, and remote work, a successful denial of service could interrupt critical business operations, meetings, and coordination efforts. This is particularly impactful for sectors with high dependency on real-time communication, such as finance, healthcare, government, and large enterprises. The requirement for authenticated access limits the attack surface to insiders or compromised accounts, but insider threats or credential theft could still enable exploitation. Disruption of Zoom services could lead to operational delays, loss of productivity, and potential reputational damage. Additionally, organizations with strict regulatory requirements for service availability and incident response (e.g., GDPR mandates on operational resilience) may face compliance challenges if the service outage is prolonged. The lack of confidentiality or integrity impact reduces the risk of data breaches from this vulnerability, but availability interruptions alone can have significant business consequences.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Monitor for updates and patches from Zoom Communications and apply them promptly once available to remediate the NULL pointer dereference flaw. 2) Implement strict access controls and multi-factor authentication (MFA) to reduce the risk of unauthorized or insider exploitation, limiting authenticated user access to trusted personnel only. 3) Employ network segmentation and firewall rules to restrict access to Zoom Workplace Apps to known and trusted network segments, reducing exposure to potential attackers. 4) Monitor application logs and network traffic for unusual activity that could indicate attempts to exploit the vulnerability, such as repeated crashes or malformed requests. 5) Develop and test incident response plans that include Zoom service outages to ensure rapid recovery and communication during denial of service events. 6) Consider temporary compensating controls such as limiting the use of Zoom Workplace Apps on Windows to essential users or deploying alternative communication tools until the vulnerability is patched. 7) Educate users about the importance of safeguarding credentials to prevent authenticated exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Zoom
Date Reserved
2025-03-24T22:35:25.475Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fb1484d88663aec8a7

Added to database: 5/20/2025, 6:59:07 PM

Last enriched: 7/6/2025, 1:42:39 PM

Last updated: 8/18/2025, 11:34:25 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats