Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64738: CWE-73: External Control of File Name or Path in Zoom Communications Inc. Zoom Workplace for macOS

0
Medium
VulnerabilityCVE-2025-64738cvecve-2025-64738cwe-73
Published: Thu Nov 13 2025 (11/13/2025, 14:23:00 UTC)
Source: CVE Database V5
Vendor/Project: Zoom Communications Inc.
Product: Zoom Workplace for macOS

Description

External control of file name or path in Zoom Workplace for macOS before version 6.5.10 may allow an authenticated user to conduct a disclosure of information via local access.

AI-Powered Analysis

AILast updated: 11/20/2025, 15:05:26 UTC

Technical Analysis

CVE-2025-64738 is a vulnerability classified under CWE-73 (External Control of File Name or Path) found in Zoom Communications Inc.'s Zoom Workplace application for macOS versions before 6.5.10. This flaw allows an authenticated user with local access to manipulate file names or paths used by the application, potentially leading to unauthorized disclosure of sensitive information stored or processed by the software. The vulnerability does not require elevated privileges beyond authentication, but it does require user interaction, indicating that exploitation might involve tricking a user into performing certain actions within the application. The CVSS v3.1 score is 5.0 (medium severity), reflecting a high impact on confidentiality but no impact on integrity or availability. The attack vector is local (AV:L), with low attack complexity (AC:L), and privileges required are low (PR:L). The vulnerability scope is unchanged (S:U), meaning the exploit affects only the vulnerable component. No patches or exploits are currently publicly available, but the vendor has acknowledged and published the vulnerability. This issue could allow attackers to access sensitive files or data paths by controlling file names or paths externally, which could lead to information leakage within environments where Zoom Workplace is used on macOS systems.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to confidentiality, as sensitive information could be disclosed to unauthorized users with local access. Organizations with macOS endpoints running Zoom Workplace are at risk, especially in environments where multiple users share devices or where endpoint security is lax. The impact is heightened in sectors handling sensitive or regulated data, such as finance, healthcare, and government institutions. Since the vulnerability requires local authenticated access and user interaction, remote exploitation is unlikely, but insider threats or compromised endpoints could leverage this flaw. The lack of impact on integrity and availability reduces the risk of disruption but does not diminish the potential for data breaches. Given Zoom's widespread use across Europe, particularly in corporate and educational sectors, the vulnerability could affect a broad range of organizations if not mitigated promptly.

Mitigation Recommendations

Organizations should immediately verify the version of Zoom Workplace for macOS deployed and plan to upgrade to version 6.5.10 or later once available. Until a patch is released, restrict local access to macOS devices running Zoom Workplace to trusted users only, employing strict endpoint access controls and user account management. Implement application whitelisting and monitor for unusual file access patterns related to Zoom Workplace directories. Educate users about the risk of interacting with suspicious prompts or files within Zoom Workplace. Employ endpoint detection and response (EDR) solutions to detect anomalous behavior indicative of exploitation attempts. Regularly audit local user permissions and remove unnecessary privileges to minimize the risk of exploitation. Additionally, maintain up-to-date backups and ensure that sensitive data is encrypted at rest to reduce the impact of potential information disclosure.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Zoom
Date Reserved
2025-11-10T19:56:35.266Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6915ee5ff690f81e3c76b572

Added to database: 11/13/2025, 2:42:39 PM

Last enriched: 11/20/2025, 3:05:26 PM

Last updated: 12/29/2025, 8:23:10 AM

Views: 74

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats