CVE-2025-49459: CWE-862 Missing Authorization in Zoom Communications, Inc Zoom Workplace for Windows on ARM
Missing authorization in the installer for Zoom Workplace for Windows on ARM before version 6.5.0 may allow an authenticated user to conduct an escalation of privilege via local access.
AI Analysis
Technical Summary
CVE-2025-49459 is a high-severity vulnerability identified in Zoom Communications, Inc's Zoom Workplace application specifically for Windows on ARM platforms, affecting versions prior to 6.5.0. The vulnerability is classified under CWE-862, which denotes a missing authorization issue. In this case, the installer component of Zoom Workplace lacks proper authorization checks, allowing an authenticated local user to escalate their privileges. This means that a user with limited rights on the affected system could exploit this flaw to gain higher privileges, potentially administrative-level access. The vulnerability requires local access and some level of authentication (i.e., the attacker must already have a user account on the system), but does not require user interaction beyond executing the installer. The CVSS v3.1 score is 7.8, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and no user interaction needed. The vulnerability could allow an attacker to execute arbitrary code with elevated privileges, modify system configurations, or access sensitive data, severely compromising the affected system. No known exploits are currently reported in the wild, and no patches have been linked yet, indicating that organizations should prioritize monitoring and mitigation efforts as updates become available.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially in environments where Zoom Workplace for Windows on ARM is deployed. The escalation of privilege could allow malicious insiders or compromised user accounts to gain administrative control over endpoints, leading to potential data breaches, unauthorized access to corporate communications, and disruption of business operations. Given the widespread use of Zoom products for remote collaboration, exploitation could also facilitate lateral movement within networks, increasing the risk of broader compromise. The impact is particularly critical for sectors with stringent data protection requirements such as finance, healthcare, and government institutions in Europe, where unauthorized access could lead to violations of GDPR and other regulatory frameworks. Additionally, organizations using ARM-based Windows devices, which are increasingly common in mobile and lightweight computing scenarios, may be more exposed if they have not updated to patched versions.
Mitigation Recommendations
European organizations should implement the following specific mitigation strategies: 1) Immediately inventory and identify all Windows on ARM devices running Zoom Workplace to assess exposure. 2) Restrict local user permissions rigorously to minimize the number of users with authenticated access capable of exploiting this vulnerability. 3) Monitor and control the execution of installers and software installation processes using application whitelisting or endpoint protection platforms to detect and block unauthorized privilege escalation attempts. 4) Apply the Zoom Workplace update to version 6.5.0 or later as soon as it becomes available, prioritizing ARM-based Windows devices. 5) Employ enhanced logging and alerting on privilege escalation events and installer executions to detect potential exploitation attempts early. 6) Educate IT and security teams about this specific vulnerability to ensure rapid response and patch management. 7) Consider network segmentation and least privilege principles to limit the impact of any compromised endpoint.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Finland, Ireland, Belgium
CVE-2025-49459: CWE-862 Missing Authorization in Zoom Communications, Inc Zoom Workplace for Windows on ARM
Description
Missing authorization in the installer for Zoom Workplace for Windows on ARM before version 6.5.0 may allow an authenticated user to conduct an escalation of privilege via local access.
AI-Powered Analysis
Technical Analysis
CVE-2025-49459 is a high-severity vulnerability identified in Zoom Communications, Inc's Zoom Workplace application specifically for Windows on ARM platforms, affecting versions prior to 6.5.0. The vulnerability is classified under CWE-862, which denotes a missing authorization issue. In this case, the installer component of Zoom Workplace lacks proper authorization checks, allowing an authenticated local user to escalate their privileges. This means that a user with limited rights on the affected system could exploit this flaw to gain higher privileges, potentially administrative-level access. The vulnerability requires local access and some level of authentication (i.e., the attacker must already have a user account on the system), but does not require user interaction beyond executing the installer. The CVSS v3.1 score is 7.8, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and no user interaction needed. The vulnerability could allow an attacker to execute arbitrary code with elevated privileges, modify system configurations, or access sensitive data, severely compromising the affected system. No known exploits are currently reported in the wild, and no patches have been linked yet, indicating that organizations should prioritize monitoring and mitigation efforts as updates become available.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially in environments where Zoom Workplace for Windows on ARM is deployed. The escalation of privilege could allow malicious insiders or compromised user accounts to gain administrative control over endpoints, leading to potential data breaches, unauthorized access to corporate communications, and disruption of business operations. Given the widespread use of Zoom products for remote collaboration, exploitation could also facilitate lateral movement within networks, increasing the risk of broader compromise. The impact is particularly critical for sectors with stringent data protection requirements such as finance, healthcare, and government institutions in Europe, where unauthorized access could lead to violations of GDPR and other regulatory frameworks. Additionally, organizations using ARM-based Windows devices, which are increasingly common in mobile and lightweight computing scenarios, may be more exposed if they have not updated to patched versions.
Mitigation Recommendations
European organizations should implement the following specific mitigation strategies: 1) Immediately inventory and identify all Windows on ARM devices running Zoom Workplace to assess exposure. 2) Restrict local user permissions rigorously to minimize the number of users with authenticated access capable of exploiting this vulnerability. 3) Monitor and control the execution of installers and software installation processes using application whitelisting or endpoint protection platforms to detect and block unauthorized privilege escalation attempts. 4) Apply the Zoom Workplace update to version 6.5.0 or later as soon as it becomes available, prioritizing ARM-based Windows devices. 5) Employ enhanced logging and alerting on privilege escalation events and installer executions to detect potential exploitation attempts early. 6) Educate IT and security teams about this specific vulnerability to ensure rapid response and patch management. 7) Consider network segmentation and least privilege principles to limit the impact of any compromised endpoint.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Zoom
- Date Reserved
- 2025-06-04T22:48:18.920Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68c09d9f9ed239a66bacf8e1
Added to database: 9/9/2025, 9:35:27 PM
Last enriched: 9/9/2025, 9:50:23 PM
Last updated: 9/10/2025, 4:07:21 AM
Views: 5
Related Threats
CVE-2025-36759: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in SolaX Power SolaX Cloud
HighCVE-2025-36758: CWE-307 Improper Restriction of Excessive Authentication Attempts in SolaX Power SolaX Cloud
MediumCVE-2025-36757: CWE-306 Missing Authentication for Critical Function in SolaX Power SolaX Cloud
MediumCVE-2025-36756: CWE-862 Missing Authorization in SolaX Power SolaX Cloud
MediumCVE-2025-9943: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Shibboleth Service Provider
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.