Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58135: CWE-837: Improper Enforcement of a Single, Unique Action in Zoom Communications, Inc Zoom Workplace Clients for Windows

0
Medium
VulnerabilityCVE-2025-58135cvecve-2025-58135cwe-837
Published: Tue Sep 09 2025 (09/09/2025, 21:45:52 UTC)
Source: CVE Database V5
Vendor/Project: Zoom Communications, Inc
Product: Zoom Workplace Clients for Windows

Description

Improper action enforcement in certain Zoom Workplace Clients for Windows may allow an unauthenticated user to conduct a disclosure of information via network access.

AI-Powered Analysis

AILast updated: 09/17/2025, 00:55:18 UTC

Technical Analysis

CVE-2025-58135 is a medium severity vulnerability identified in Zoom Communications, Inc's Zoom Workplace Clients for Windows. The vulnerability is categorized under CWE-837, which pertains to improper enforcement of a single, unique action. Specifically, this flaw allows an unauthenticated attacker to exploit improper action enforcement mechanisms within the Zoom Workplace client software. The consequence of this vulnerability is an information disclosure via network access, meaning that sensitive or confidential information could be exposed to unauthorized parties without requiring authentication. The CVSS v3.1 base score is 5.3, indicating a medium level of severity. The vector string (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N) reveals that the attack can be performed remotely over the network (AV:N) but requires high attack complexity (AC:H), no privileges (PR:N), and some user interaction (UI:R). The scope remains unchanged (S:U), and the impact is high on confidentiality (C:H), with no impact on integrity (I:N) or availability (A:N). No known exploits are currently reported in the wild, and no patches or mitigation links have been provided yet. The vulnerability was reserved and published in late August and early September 2025, respectively. This vulnerability affects the Windows version of Zoom Workplace Clients, which is a collaboration and communication platform used by enterprises for workplace communication and coordination.

Potential Impact

For European organizations, this vulnerability poses a risk of unauthorized information disclosure through the Zoom Workplace client on Windows systems. Given the widespread use of Zoom products in corporate environments across Europe for remote work, meetings, and collaboration, sensitive corporate data, internal communications, or proprietary information could be exposed if exploited. The requirement for user interaction and high attack complexity somewhat limits the ease of exploitation; however, targeted phishing or social engineering campaigns could facilitate exploitation. The confidentiality impact is high, which could lead to data breaches, loss of competitive advantage, or regulatory non-compliance under GDPR if personal or sensitive data is leaked. Since the vulnerability does not affect integrity or availability, operational disruption is less likely, but the reputational and compliance consequences could be significant. Organizations relying heavily on Zoom Workplace for internal communications should consider this vulnerability seriously, especially those in regulated industries or handling sensitive information.

Mitigation Recommendations

Given the absence of an official patch or update at this time, European organizations should implement several practical mitigations: 1) Limit the use of Zoom Workplace Clients for Windows to trusted users and environments, reducing exposure. 2) Educate users about the risk of social engineering and phishing attacks that could trigger the required user interaction for exploitation. 3) Employ network segmentation and monitoring to detect unusual network activity related to Zoom client communications. 4) Use endpoint protection solutions capable of detecting anomalous behavior in Zoom client processes. 5) Consider temporarily restricting or disabling Zoom Workplace Client usage on Windows systems in high-risk environments until a patch is available. 6) Maintain up-to-date inventories of affected software versions and monitor vendor advisories for patches or updates. 7) Enforce strict access controls and data encryption to minimize the impact of any potential information disclosure. 8) Implement multi-factor authentication and strong user authentication policies to reduce the risk of unauthorized access through other vectors, complementing the defense against this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Zoom
Date Reserved
2025-08-25T21:15:02.863Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c0a1239ed239a66bad10a5

Added to database: 9/9/2025, 9:50:27 PM

Last enriched: 9/17/2025, 12:55:18 AM

Last updated: 10/30/2025, 2:17:38 PM

Views: 26

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats