CVE-2025-58133: CWE-288: Authentication Bypass Using an Alternate Path or Channel in Zoom Communications Inc. Zoom Clients for Windows
Authentication bypass in some Zoom Rooms Clients before version 6.5.1 may allow an unauthenticated user to conduct a disclosure of information via network access.
CVE-2025-58133: CWE-288: Authentication Bypass Using an Alternate Path or Channel in Zoom Communications Inc. Zoom Clients for Windows
Description
Authentication bypass in some Zoom Rooms Clients before version 6.5.1 may allow an unauthenticated user to conduct a disclosure of information via network access.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Zoom
- Date Reserved
- 2025-08-25T21:15:02.862Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68efca8eed06978b6a59739c
Added to database: 10/15/2025, 4:23:42 PM
Last updated: 10/15/2025, 4:24:01 PM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-58132: CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection') in Zoom Communications Inc. Zoom Clients for Windows
MediumCVE-2025-20360: Buffer Access with Incorrect Length Value in Cisco Cisco Secure Firewall Threat Defense (FTD) Software
MediumCVE-2025-20359: Buffer Under-read in Cisco Cisco Cyber Vision
MediumCVE-2025-20351: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Cisco Cisco Session Initiation Protocol (SIP) Software
MediumCVE-2025-20350: Stack-based Buffer Overflow in Cisco Cisco Session Initiation Protocol (SIP) Software
HighActions
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.