Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-49459: CWE-862 Missing Authorization in Zoom Communications, Inc Zoom Workplace for Windows on ARM

0
High
VulnerabilityCVE-2025-49459cvecve-2025-49459cwe-862
Published: Tue Sep 09 2025 (09/09/2025, 21:29:33 UTC)
Source: CVE Database V5
Vendor/Project: Zoom Communications, Inc
Product: Zoom Workplace for Windows on ARM

Description

Missing authorization in the installer for Zoom Workplace for Windows on ARM before version 6.5.0 may allow an authenticated user to conduct an escalation of privilege via local access.

AI-Powered Analysis

AILast updated: 09/17/2025, 00:50:38 UTC

Technical Analysis

CVE-2025-49459 is a high-severity vulnerability identified in Zoom Communications, Inc's Zoom Workplace application specifically for Windows on ARM platforms. The vulnerability stems from a missing authorization check in the installer component of Zoom Workplace versions prior to 6.5.0. This flaw allows an authenticated local user—meaning someone with legitimate access to the system but with limited privileges—to escalate their privileges on the affected machine. The vulnerability is categorized under CWE-862, which refers to missing authorization, indicating that the installer does not properly verify whether the user has the necessary permissions to perform certain privileged actions during installation or update processes. The CVSS v3.1 base score of 7.8 reflects a high impact, with the vector indicating that the attack requires local access (AV:L), low attack complexity (AC:L), privileges required are low (PR:L), no user interaction is needed (UI:N), and the scope is unchanged (S:U). The impact on confidentiality, integrity, and availability is rated high (C:H/I:H/A:H), meaning an attacker could gain full control over the system, potentially accessing sensitive data, modifying application or system files, and disrupting service availability. No known exploits are currently reported in the wild, and no patch links are provided yet, suggesting that mitigation may require vendor updates or workarounds. This vulnerability is particularly relevant for organizations deploying Zoom Workplace on Windows ARM devices, which are increasingly common in mobile and lightweight computing environments.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for enterprises and public sector entities that rely on Zoom Workplace for internal communications and collaboration on Windows ARM devices. Successful exploitation could allow a malicious insider or compromised user account to gain administrative privileges, leading to unauthorized access to sensitive corporate communications, intellectual property, or personal data protected under GDPR. The high impact on confidentiality, integrity, and availability means attackers could manipulate meeting data, intercept or alter communications, or disrupt business operations. Given the increasing adoption of ARM-based Windows devices in Europe for their power efficiency and portability, this vulnerability could affect a broad range of sectors including finance, healthcare, government, and education. The lack of user interaction requirement and low complexity of exploitation further increase the threat level, as attackers with minimal privileges could leverage this flaw without needing to trick users or perform complex attacks. This could also facilitate lateral movement within networks, escalating the risk of broader compromise.

Mitigation Recommendations

European organizations should prioritize the following specific mitigation steps: 1) Immediately inventory all Windows ARM devices running Zoom Workplace and identify versions prior to 6.5.0. 2) Coordinate with Zoom Communications to obtain and deploy the official patch or update as soon as it becomes available. 3) Until patches are available, restrict local user permissions to the minimum necessary, especially limiting installer execution rights to trusted administrators only. 4) Implement application whitelisting to prevent unauthorized execution of installers or scripts that could exploit this vulnerability. 5) Monitor local privilege escalation attempts through endpoint detection and response (EDR) tools focusing on installer-related activities. 6) Enforce strict access controls and audit logs on devices to detect suspicious privilege escalations. 7) Educate IT staff and users about the risk of local privilege escalation and the importance of reporting unusual system behavior. 8) Consider network segmentation to isolate ARM-based devices running Zoom Workplace from critical systems to limit potential lateral movement.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Zoom
Date Reserved
2025-06-04T22:48:18.920Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c09d9f9ed239a66bacf8e1

Added to database: 9/9/2025, 9:35:27 PM

Last enriched: 9/17/2025, 12:50:38 AM

Last updated: 10/29/2025, 9:39:36 AM

Views: 39

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats