Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62484: CWE-1333: Inefficient Regular Expression Complexity in Zoom Communications Inc. Zoom Workplace

0
High
VulnerabilityCVE-2025-62484cvecve-2025-62484cwe-1333
Published: Thu Nov 13 2025 (11/13/2025, 15:07:57 UTC)
Source: CVE Database V5
Vendor/Project: Zoom Communications Inc.
Product: Zoom Workplace

Description

Inefficient regular expression complexity in certain Zoom Workplace Clients before version 6.5.10 may allow an unauthenticated user to conduct an escalation of privilege via network access.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 06:15:06 UTC

Technical Analysis

CVE-2025-62484 is a vulnerability identified in Zoom Communications Inc.'s Zoom Workplace client software versions prior to 6.5.10. The root cause is inefficient regular expression complexity (classified under CWE-1333), which can be exploited by an unauthenticated attacker over the network to escalate privileges. This type of vulnerability typically arises when a regular expression used in input validation or processing is crafted in a way that causes excessive backtracking or computational overhead, potentially leading to denial of service or enabling attackers to manipulate program logic to gain higher privileges. In this case, the vulnerability allows an attacker to escalate privileges without authentication, though user interaction is required, indicating some form of social engineering or user-triggered action is necessary to complete exploitation. The CVSS v3.1 base score of 8.1 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N) indicates that the attack can be performed remotely without privileges and with low attack complexity, but requires user interaction. The impact on confidentiality and integrity is high, meaning attackers could access sensitive information or alter data, but availability is not affected. No patches or exploits are currently publicly available, but the vulnerability is officially published and should be addressed promptly. The affected product, Zoom Workplace, is widely used in enterprise environments for collaboration and communication, making this vulnerability a significant concern for organizational security.

Potential Impact

The vulnerability allows an unauthenticated attacker to escalate privileges on Zoom Workplace clients, potentially gaining unauthorized access to sensitive communications, files, or administrative functions. This can lead to data breaches, unauthorized data modification, and compromise of user accounts or enterprise resources integrated with Zoom Workplace. Since Zoom Workplace is used globally for business collaboration, exploitation could disrupt organizational workflows and expose confidential corporate information. The requirement for user interaction suggests phishing or social engineering could be vectors, increasing the risk of targeted attacks. Although availability is not impacted, the high confidentiality and integrity impact can severely damage organizational trust and compliance posture. Enterprises relying heavily on Zoom Workplace for internal communications are at risk of espionage, data theft, and unauthorized control over collaboration environments if this vulnerability is exploited.

Mitigation Recommendations

Organizations should immediately verify their Zoom Workplace client versions and upgrade all instances to version 6.5.10 or later once available. Until patches are applied, network-level controls such as firewall rules should restrict access to Zoom Workplace client network endpoints from untrusted sources. Implement strict email and communication security policies to reduce the risk of social engineering attacks that could trigger the required user interaction. Monitor network traffic and endpoint logs for unusual activity related to Zoom Workplace processes or unexpected privilege escalations. Employ endpoint detection and response (EDR) solutions to detect anomalous behavior indicative of exploitation attempts. Conduct user awareness training focused on recognizing phishing or suspicious prompts related to Zoom Workplace. Coordinate with Zoom Communications for timely patch releases and advisories. Consider isolating Zoom Workplace clients in segmented network zones to limit lateral movement if compromise occurs.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Zoom
Date Reserved
2025-10-14T23:02:23.206Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6915f74f77eaf5a84954f4aa

Added to database: 11/13/2025, 3:20:47 PM

Last enriched: 2/27/2026, 6:15:06 AM

Last updated: 3/24/2026, 1:52:16 PM

Views: 225

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses