Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-49459: CWE-862 Missing Authorization in Zoom Communications, Inc Zoom Workplace for Windows on ARM

0
High
VulnerabilityCVE-2025-49459cvecve-2025-49459cwe-862
Published: Tue Sep 09 2025 (09/09/2025, 21:29:33 UTC)
Source: CVE Database V5
Vendor/Project: Zoom Communications, Inc
Product: Zoom Workplace for Windows on ARM

Description

Missing authorization in the installer for Zoom Workplace for Windows on ARM before version 6.5.0 may allow an authenticated user to conduct an escalation of privilege via local access.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 02:56:36 UTC

Technical Analysis

CVE-2025-49459 is a vulnerability classified under CWE-862 (Missing Authorization) found in Zoom Communications, Inc's Zoom Workplace application for Windows on ARM platforms. The flaw exists in the installer component before version 6.5.0, where insufficient authorization checks allow an authenticated user with local access to escalate their privileges. Specifically, the installer fails to verify whether the user has the appropriate permissions to perform privileged operations during installation or update processes. This missing authorization can be exploited by a local attacker who already has some level of access to the system, enabling them to gain higher privileges, potentially up to SYSTEM or administrator level. The vulnerability has a CVSS 3.1 base score of 7.8, reflecting its high impact on confidentiality, integrity, and availability, combined with relatively low attack complexity and no requirement for user interaction. Although no exploits have been reported in the wild yet, the vulnerability poses a significant risk in multi-user environments or where local access controls are weak. The ARM architecture focus indicates that this affects devices running Windows on ARM processors, which are increasingly common in enterprise and mobile computing contexts. The lack of patch links suggests that a fix is forthcoming but not yet publicly available at the time of this report.

Potential Impact

The vulnerability allows an authenticated local user to escalate privileges, potentially gaining administrative or SYSTEM-level control over affected devices. This can lead to full compromise of the system, including unauthorized access to sensitive data, modification or deletion of critical files, installation of persistent malware, and disruption of services. Organizations relying on Zoom Workplace for Windows on ARM may face increased risk of insider threats or lateral movement by attackers who gain initial footholds with limited privileges. The impact extends to confidentiality, integrity, and availability of systems and data. Given the growing adoption of Windows on ARM devices in enterprise environments, especially for remote work and collaboration, this vulnerability could facilitate sophisticated attacks targeting corporate networks. The absence of known exploits in the wild currently limits immediate risk but does not diminish the urgency for mitigation, as threat actors may develop exploits rapidly once details are public.

Mitigation Recommendations

Organizations should monitor Zoom Communications' official channels for the release of version 6.5.0 or later that addresses this vulnerability and apply updates promptly. Until patches are available, restrict local user permissions to the minimum necessary, avoiding granting installation or administrative rights to untrusted users. Employ application whitelisting and endpoint protection solutions to detect and prevent unauthorized privilege escalation attempts. Conduct regular audits of local user accounts and installed software to identify potential misuse. Consider isolating ARM-based Windows devices running Zoom Workplace in segmented network zones to limit lateral movement in case of compromise. Additionally, implement robust logging and monitoring to detect suspicious installer activity or privilege escalation attempts. Educate users about the risks of local privilege escalation and enforce strict physical and logical access controls to prevent unauthorized local access.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Zoom
Date Reserved
2025-06-04T22:48:18.920Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c09d9f9ed239a66bacf8e1

Added to database: 9/9/2025, 9:35:27 PM

Last enriched: 2/27/2026, 2:56:36 AM

Last updated: 3/22/2026, 5:36:46 PM

Views: 100

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses