Skip to main content

CVE-2025-46785: CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in Zoom Communications, Inc Zoom Workplace Apps

Medium
VulnerabilityCVE-2025-46785cvecve-2025-46785cwe-120
Published: Wed May 14 2025 (05/14/2025, 17:41:06 UTC)
Source: CVE
Vendor/Project: Zoom Communications, Inc
Product: Zoom Workplace Apps

Description

Buffer over-read in some Zoom Workplace Apps for Windows may allow an authenticated user to conduct a denial of service via network access.

AI-Powered Analysis

AILast updated: 07/06/2025, 13:54:32 UTC

Technical Analysis

CVE-2025-46785 is a medium-severity vulnerability identified in Zoom Communications, Inc's Zoom Workplace Apps for Windows. The vulnerability is classified as a classic buffer overflow (CWE-120), specifically a buffer over-read, which occurs when the application copies data into a buffer without properly checking the size of the input. This flaw can be exploited by an authenticated user over the network to cause a denial of service (DoS) condition. The vulnerability does not impact confidentiality or integrity but affects availability by potentially crashing or destabilizing the application. The CVSS 3.1 base score is 6.5, reflecting that the attack vector is network-based (AV:N), requires low complexity (AC:L), needs privileges (PR:L), and does not require user interaction (UI:N). The scope remains unchanged (S:U), and the impact is limited to availability (A:H) with no confidentiality or integrity impact. No known exploits have been reported in the wild yet, and no patches have been linked at the time of publication. The vulnerability affects certain versions of Zoom Workplace Apps for Windows, though exact versions are not specified here. Given the nature of the buffer over-read, an attacker with valid credentials could send specially crafted network packets or data to trigger the overflow, causing the application to crash or become unresponsive, resulting in denial of service for legitimate users.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to the availability of Zoom Workplace Apps used within corporate environments. Organizations relying on Zoom Workplace Apps for internal communications, collaboration, or remote work could experience service disruptions if an attacker exploits this flaw. This could impact business continuity, especially in sectors where real-time communication is critical, such as finance, healthcare, and government. Since the vulnerability requires authenticated access, the risk is somewhat mitigated by internal controls; however, insider threats or compromised credentials could still lead to exploitation. The denial of service could also be used as a distraction or part of a multi-stage attack. The lack of confidentiality or integrity impact reduces the risk of data breaches directly from this vulnerability, but operational disruption could have indirect consequences, such as delayed decision-making or reduced productivity.

Mitigation Recommendations

European organizations should prioritize applying any forthcoming patches from Zoom as soon as they become available. In the interim, organizations should enforce strict access controls and multi-factor authentication to reduce the risk of credential compromise, limiting the pool of authenticated users who could exploit this vulnerability. Network segmentation and monitoring of Zoom Workplace Apps traffic for unusual patterns or malformed packets could help detect attempted exploitation. Additionally, organizations should implement robust incident response plans to quickly recover from potential denial of service events. Regularly updating endpoint protection and employing application whitelisting can also reduce the attack surface. Finally, educating users about the importance of credential security and monitoring for insider threats will further mitigate risk.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Zoom
Date Reserved
2025-04-29T21:24:03.394Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fb1484d88663aec8af

Added to database: 5/20/2025, 6:59:07 PM

Last enriched: 7/6/2025, 1:54:32 PM

Last updated: 8/17/2025, 9:57:02 AM

Views: 32

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats