Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-30668: CWE-191 Integer Underflow (Wrap or Wraparound) in Zoom Communications, Inc Zoom Workplace Apps

0
Medium
VulnerabilityCVE-2025-30668cvecve-2025-30668cwe-191
Published: Wed May 14 2025 (05/14/2025, 17:39:55 UTC)
Source: CVE
Vendor/Project: Zoom Communications, Inc
Product: Zoom Workplace Apps

Description

Integer underflow in some Zoom Workplace Apps may allow an authenticated user to conduct a denial of service via network access.

AI-Powered Analysis

AILast updated: 10/03/2025, 00:13:32 UTC

Technical Analysis

CVE-2025-30668 is an integer underflow vulnerability (CWE-191) identified in Zoom Communications, Inc's Zoom Workplace Apps. An integer underflow occurs when an arithmetic operation causes a numeric value to wrap around below its minimum representable value, potentially leading to unexpected behavior or memory corruption. In this case, the flaw exists within certain versions of Zoom Workplace Apps and can be triggered by an authenticated user via network access. Exploiting this vulnerability allows the attacker to cause a denial of service (DoS) condition, disrupting the availability of the affected application. The vulnerability does not impact confidentiality or integrity directly but results in service unavailability. The CVSS 3.1 base score is 6.5 (medium severity), reflecting that the attack vector is network-based (AV:N), requires low attack complexity (AC:L), and requires privileges (PR:L) but no user interaction (UI:N). The scope remains unchanged (S:U), and the impact is limited to availability (A:H) without affecting confidentiality or integrity. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was reserved in March 2025 and published in May 2025, indicating recent discovery and disclosure. The lack of patches suggests organizations should prioritize monitoring and mitigation to prevent potential exploitation once exploit code becomes available.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to the availability of Zoom Workplace Apps, which are widely used for internal communications, collaboration, and workflow management. A successful denial of service attack could disrupt business operations, delay communications, and impact productivity, especially in organizations heavily reliant on Zoom's ecosystem. Sectors such as finance, healthcare, government, and critical infrastructure that depend on continuous availability of communication tools may experience operational setbacks. While the vulnerability does not compromise data confidentiality or integrity, the disruption of service can have cascading effects on business continuity and incident response capabilities. Additionally, organizations with compliance obligations around service availability and uptime (e.g., under GDPR or sector-specific regulations) may face regulatory scrutiny if disruptions occur. The requirement for authenticated access limits the attack surface to internal or trusted users, but insider threats or compromised credentials could be leveraged to exploit this vulnerability.

Mitigation Recommendations

1. Monitor for official patches or updates from Zoom Communications and apply them promptly once available. 2. Implement strict access controls and multi-factor authentication (MFA) to reduce the risk of credential compromise and unauthorized authenticated access. 3. Employ network segmentation and limit access to Zoom Workplace Apps to only necessary users and devices. 4. Monitor application logs and network traffic for unusual activity that could indicate attempts to exploit this vulnerability or cause service disruptions. 5. Prepare incident response plans specifically addressing denial of service scenarios affecting collaboration tools. 6. Consider temporary compensating controls such as restricting the use of vulnerable app versions or disabling non-essential features that may trigger the underflow until patches are applied. 7. Educate users about the importance of safeguarding credentials to prevent insider exploitation. 8. Engage with Zoom support or security advisories to stay informed about emerging threats and remediation guidance.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Zoom
Date Reserved
2025-03-24T22:35:25.475Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fb1484d88663aec8ad

Added to database: 5/20/2025, 6:59:07 PM

Last enriched: 10/3/2025, 12:13:32 AM

Last updated: 10/7/2025, 1:48:34 PM

Views: 27

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats