Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62483: CWE-212 Improper Removal of Sensitive Information Before Storage or Transfer in Zoom Communications Inc. Zoom Clients

0
Medium
VulnerabilityCVE-2025-62483cvecve-2025-62483cwe-212
Published: Thu Nov 13 2025 (11/13/2025, 15:03:07 UTC)
Source: CVE Database V5
Vendor/Project: Zoom Communications Inc.
Product: Zoom Clients

Description

Improper removal of sensitive information in certain Zoom Clients before version 6.5.10 may allow an unauthenticated user to conduct a disclosure of information via network access.

AI-Powered Analysis

AILast updated: 11/13/2025, 15:35:36 UTC

Technical Analysis

CVE-2025-62483 is a vulnerability identified in Zoom Communications Inc.'s Zoom Clients before version 6.5.10, classified under CWE-212, which pertains to the improper removal of sensitive information before storage or transfer. This vulnerability allows an unauthenticated attacker to remotely access sensitive information via network access without requiring any user interaction or privileges. The root cause lies in the failure of the affected Zoom Clients to adequately sanitize or remove sensitive data remnants before storing or transmitting them, potentially exposing confidential information to unauthorized parties. The vulnerability is network exploitable (AV:N), requires low attack complexity (AC:L), no privileges (PR:N), and no user interaction (UI:N), with an impact limited to confidentiality (C:L) and no effect on integrity or availability. Although no known exploits have been reported in the wild, the exposure of sensitive information could lead to privacy breaches or intelligence gathering by adversaries. The vulnerability was reserved on 2025-10-14 and published on 2025-11-13. No patch links are currently provided, but upgrading to version 6.5.10 or later is implied as a fix. The vulnerability affects all Zoom Clients prior to the fixed version, which are widely used globally for video conferencing and communication, making the potential attack surface significant.

Potential Impact

For European organizations, this vulnerability poses a risk of sensitive information leakage through Zoom communications, which could include meeting metadata, user credentials, or other confidential data inadvertently retained and exposed by the client. Sectors such as government, finance, healthcare, and critical infrastructure that rely heavily on Zoom for secure communications could suffer confidentiality breaches, potentially leading to espionage, data theft, or reputational damage. The medium severity and limited scope (confidentiality only) reduce the likelihood of widespread disruption but do not eliminate the risk of targeted attacks. The unauthenticated and network-based nature of the vulnerability increases the attack surface, especially in environments with open or poorly segmented networks. European organizations with strict data protection regulations (e.g., GDPR) may face compliance risks if sensitive personal data is exposed. The absence of known exploits suggests a window of opportunity for proactive mitigation before active exploitation occurs.

Mitigation Recommendations

1. Immediately upgrade all Zoom Clients to version 6.5.10 or later once available to ensure the vulnerability is patched. 2. Conduct network traffic monitoring and analysis to detect any unusual data transmissions that could indicate exploitation attempts or data leakage. 3. Implement network segmentation and restrict Zoom client network access to trusted zones to limit exposure to unauthenticated attackers. 4. Review and enforce strict data handling and retention policies within Zoom usage to minimize sensitive data exposure. 5. Educate users on the importance of keeping Zoom clients updated and reporting suspicious activity. 6. Coordinate with IT and security teams to audit existing Zoom deployments and remove or isolate outdated client versions. 7. Employ endpoint detection and response (EDR) tools to identify anomalous behaviors related to Zoom client processes. 8. Prepare incident response plans specific to potential data disclosure incidents stemming from this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Zoom
Date Reserved
2025-10-14T23:02:23.206Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6915f74f77eaf5a84954f4ad

Added to database: 11/13/2025, 3:20:47 PM

Last enriched: 11/13/2025, 3:35:36 PM

Last updated: 11/14/2025, 4:08:07 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats