Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58134: CWE-863 Incorrect Authorization in Zoom Communications, Inc Zoom Workplace Clients for Windows

0
Medium
VulnerabilityCVE-2025-58134cvecve-2025-58134cwe-863
Published: Tue Sep 09 2025 (09/09/2025, 21:44:01 UTC)
Source: CVE Database V5
Vendor/Project: Zoom Communications, Inc
Product: Zoom Workplace Clients for Windows

Description

Incorrect authorization in certain Zoom Workplace Clients for Windows may allow an authenticated user to conduct an impact to integrity via network access.

AI-Powered Analysis

AILast updated: 09/17/2025, 00:52:36 UTC

Technical Analysis

CVE-2025-58134 is a medium-severity vulnerability classified under CWE-863 (Incorrect Authorization) affecting Zoom Communications, Inc's Zoom Workplace Clients for Windows. The vulnerability arises due to improper authorization checks within certain versions of the Zoom Workplace client software, which may allow an authenticated user to perform unauthorized actions that impact the integrity of the system via network access. Specifically, an attacker who has valid user credentials and can interact with the application over the network could exploit this flaw to alter or manipulate data or application state in ways not intended by the authorization policy. The CVSS v3.1 base score is 4.3, reflecting a medium severity level, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope remains unchanged (S:U), with no impact on confidentiality or availability, but a low impact on integrity (I:L). No known exploits are currently reported in the wild, and no patches or mitigation links are provided at this time. The vulnerability was reserved on August 25, 2025, and published on September 9, 2025. This suggests it is a recently disclosed issue that organizations should monitor closely. The affected product is specifically the Windows client for Zoom Workplace, a collaboration and communication platform used in enterprise environments.

Potential Impact

For European organizations, the impact of this vulnerability primarily concerns the integrity of communications and data handled through the Zoom Workplace client on Windows systems. Since Zoom Workplace is used for internal collaboration, unauthorized integrity modifications could lead to misinformation, manipulation of shared documents or messages, or unauthorized changes in workflows. Although confidentiality and availability are not directly affected, the integrity compromise could undermine trust in communication channels and potentially disrupt business processes. This is particularly critical for sectors relying heavily on secure and accurate communications, such as finance, healthcare, legal, and government institutions. The requirement for user interaction and no privilege requirement lowers the barrier for exploitation, meaning that phishing or social engineering could be leveraged to trigger the vulnerability. The lack of known exploits in the wild currently reduces immediate risk, but the presence of this flaw in a widely used communication tool necessitates prompt attention to prevent future exploitation.

Mitigation Recommendations

Given the absence of official patches or updates at this time, European organizations should implement several targeted mitigations: 1) Enforce strict user access controls and multi-factor authentication (MFA) to reduce the risk of unauthorized authenticated access. 2) Educate users about phishing and social engineering risks to minimize the chance of triggering the vulnerability via user interaction. 3) Monitor network traffic and application logs for unusual activity related to Zoom Workplace clients, focusing on integrity anomalies or unauthorized modification attempts. 4) Restrict Zoom Workplace client usage to trusted networks or VPNs where possible to limit exposure to external network attacks. 5) Maintain up-to-date endpoint protection and intrusion detection systems that can detect anomalous behavior associated with exploitation attempts. 6) Prepare for rapid deployment of patches once Zoom releases updates addressing this vulnerability by establishing a vulnerability management process that prioritizes this CVE. 7) Consider temporary alternative communication tools if the risk is deemed unacceptable until a fix is available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Zoom
Date Reserved
2025-08-25T21:15:02.863Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c0a1239ed239a66bad10a2

Added to database: 9/9/2025, 9:50:27 PM

Last enriched: 9/17/2025, 12:52:36 AM

Last updated: 10/29/2025, 2:50:09 PM

Views: 43

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats