CVE-2025-49459: CWE-862 Missing Authorization in Zoom Communications, Inc Zoom Workplace for Windows on ARM
Missing authorization in the installer for Zoom Workplace for Windows on ARM before version 6.5.0 may allow an authenticated user to conduct an escalation of privilege via local access.
AI Analysis
Technical Summary
CVE-2025-49459 is a high-severity vulnerability identified in Zoom Communications, Inc's Zoom Workplace application specifically for Windows on ARM platforms. The vulnerability stems from a missing authorization check in the installer component of Zoom Workplace versions prior to 6.5.0. This flaw allows an authenticated local user—meaning someone with legitimate access to the system but with limited privileges—to escalate their privileges on the affected machine. The vulnerability is categorized under CWE-862, which refers to missing authorization, indicating that the installer does not properly verify whether the user has the necessary permissions to perform certain privileged actions during installation or update processes. The CVSS v3.1 base score of 7.8 reflects a high impact, with the vector indicating that the attack requires local access (AV:L), low attack complexity (AC:L), privileges required are low (PR:L), no user interaction is needed (UI:N), and the scope is unchanged (S:U). The impact on confidentiality, integrity, and availability is rated high (C:H/I:H/A:H), meaning an attacker could gain full control over the system, potentially accessing sensitive data, modifying application or system files, and disrupting service availability. No known exploits are currently reported in the wild, and no patch links are provided yet, suggesting that mitigation may require vendor updates or workarounds. This vulnerability is particularly relevant for organizations deploying Zoom Workplace on Windows ARM devices, which are increasingly common in mobile and lightweight computing environments.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for enterprises and public sector entities that rely on Zoom Workplace for internal communications and collaboration on Windows ARM devices. Successful exploitation could allow a malicious insider or compromised user account to gain administrative privileges, leading to unauthorized access to sensitive corporate communications, intellectual property, or personal data protected under GDPR. The high impact on confidentiality, integrity, and availability means attackers could manipulate meeting data, intercept or alter communications, or disrupt business operations. Given the increasing adoption of ARM-based Windows devices in Europe for their power efficiency and portability, this vulnerability could affect a broad range of sectors including finance, healthcare, government, and education. The lack of user interaction requirement and low complexity of exploitation further increase the threat level, as attackers with minimal privileges could leverage this flaw without needing to trick users or perform complex attacks. This could also facilitate lateral movement within networks, escalating the risk of broader compromise.
Mitigation Recommendations
European organizations should prioritize the following specific mitigation steps: 1) Immediately inventory all Windows ARM devices running Zoom Workplace and identify versions prior to 6.5.0. 2) Coordinate with Zoom Communications to obtain and deploy the official patch or update as soon as it becomes available. 3) Until patches are available, restrict local user permissions to the minimum necessary, especially limiting installer execution rights to trusted administrators only. 4) Implement application whitelisting to prevent unauthorized execution of installers or scripts that could exploit this vulnerability. 5) Monitor local privilege escalation attempts through endpoint detection and response (EDR) tools focusing on installer-related activities. 6) Enforce strict access controls and audit logs on devices to detect suspicious privilege escalations. 7) Educate IT staff and users about the risk of local privilege escalation and the importance of reporting unusual system behavior. 8) Consider network segmentation to isolate ARM-based devices running Zoom Workplace from critical systems to limit potential lateral movement.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2025-49459: CWE-862 Missing Authorization in Zoom Communications, Inc Zoom Workplace for Windows on ARM
Description
Missing authorization in the installer for Zoom Workplace for Windows on ARM before version 6.5.0 may allow an authenticated user to conduct an escalation of privilege via local access.
AI-Powered Analysis
Technical Analysis
CVE-2025-49459 is a high-severity vulnerability identified in Zoom Communications, Inc's Zoom Workplace application specifically for Windows on ARM platforms. The vulnerability stems from a missing authorization check in the installer component of Zoom Workplace versions prior to 6.5.0. This flaw allows an authenticated local user—meaning someone with legitimate access to the system but with limited privileges—to escalate their privileges on the affected machine. The vulnerability is categorized under CWE-862, which refers to missing authorization, indicating that the installer does not properly verify whether the user has the necessary permissions to perform certain privileged actions during installation or update processes. The CVSS v3.1 base score of 7.8 reflects a high impact, with the vector indicating that the attack requires local access (AV:L), low attack complexity (AC:L), privileges required are low (PR:L), no user interaction is needed (UI:N), and the scope is unchanged (S:U). The impact on confidentiality, integrity, and availability is rated high (C:H/I:H/A:H), meaning an attacker could gain full control over the system, potentially accessing sensitive data, modifying application or system files, and disrupting service availability. No known exploits are currently reported in the wild, and no patch links are provided yet, suggesting that mitigation may require vendor updates or workarounds. This vulnerability is particularly relevant for organizations deploying Zoom Workplace on Windows ARM devices, which are increasingly common in mobile and lightweight computing environments.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for enterprises and public sector entities that rely on Zoom Workplace for internal communications and collaboration on Windows ARM devices. Successful exploitation could allow a malicious insider or compromised user account to gain administrative privileges, leading to unauthorized access to sensitive corporate communications, intellectual property, or personal data protected under GDPR. The high impact on confidentiality, integrity, and availability means attackers could manipulate meeting data, intercept or alter communications, or disrupt business operations. Given the increasing adoption of ARM-based Windows devices in Europe for their power efficiency and portability, this vulnerability could affect a broad range of sectors including finance, healthcare, government, and education. The lack of user interaction requirement and low complexity of exploitation further increase the threat level, as attackers with minimal privileges could leverage this flaw without needing to trick users or perform complex attacks. This could also facilitate lateral movement within networks, escalating the risk of broader compromise.
Mitigation Recommendations
European organizations should prioritize the following specific mitigation steps: 1) Immediately inventory all Windows ARM devices running Zoom Workplace and identify versions prior to 6.5.0. 2) Coordinate with Zoom Communications to obtain and deploy the official patch or update as soon as it becomes available. 3) Until patches are available, restrict local user permissions to the minimum necessary, especially limiting installer execution rights to trusted administrators only. 4) Implement application whitelisting to prevent unauthorized execution of installers or scripts that could exploit this vulnerability. 5) Monitor local privilege escalation attempts through endpoint detection and response (EDR) tools focusing on installer-related activities. 6) Enforce strict access controls and audit logs on devices to detect suspicious privilege escalations. 7) Educate IT staff and users about the risk of local privilege escalation and the importance of reporting unusual system behavior. 8) Consider network segmentation to isolate ARM-based devices running Zoom Workplace from critical systems to limit potential lateral movement.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Zoom
- Date Reserved
- 2025-06-04T22:48:18.920Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68c09d9f9ed239a66bacf8e1
Added to database: 9/9/2025, 9:35:27 PM
Last enriched: 9/17/2025, 12:50:38 AM
Last updated: 10/29/2025, 9:39:36 AM
Views: 39
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12450: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in litespeedtech LiteSpeed Cache
MediumCVE-2025-64291: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Premmerce Premmerce User Roles
UnknownCVE-2025-64290: Cross-Site Request Forgery (CSRF) in Premmerce Premmerce Product Search for WooCommerce
UnknownCVE-2025-64289: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Premmerce Premmerce Product Search for WooCommerce
UnknownCVE-2025-64286: Cross-Site Request Forgery (CSRF) in WpEstate WP Rentals
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.