CVE-2025-64739: CWE-73: External Control of File Name or Path in Zoom Communications Inc. Zoom Clients
External control of file name or path in certain Zoom Clients may allow an unauthenticated user to conduct a disclosure of information via network access.
AI Analysis
Technical Summary
CVE-2025-64739 is a vulnerability classified under CWE-73 (External Control of File Name or Path) affecting Zoom Communications Inc.'s Zoom Clients. The flaw allows an unauthenticated remote attacker to influence file names or paths used by the application, potentially leading to unauthorized disclosure of information over the network. Specifically, the vulnerability arises when the Zoom Client improperly handles externally supplied input that controls file path parameters, enabling attackers to access sensitive files or data that should otherwise be protected. The vulnerability does not require any privileges or prior authentication but does require user interaction, such as clicking a malicious link or opening a crafted Zoom message. The CVSS v3.1 base score is 4.3, indicating medium severity, with the vector AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N, meaning network attack vector, low attack complexity, no privileges required, user interaction required, unchanged scope, and only confidentiality impact. No known exploits have been reported in the wild as of the publication date. The affected versions are not explicitly listed but are referenced in vendor advisories. The vulnerability could allow attackers to disclose sensitive information from the victim's system by manipulating file paths used by Zoom Clients, potentially exposing private meeting data or user files. This type of vulnerability is critical to address in communication platforms due to their widespread use and access to sensitive information.
Potential Impact
For European organizations, this vulnerability poses a risk of unauthorized information disclosure, which can compromise confidentiality of sensitive communications, internal documents, or user data transmitted or stored via Zoom Clients. Sectors such as government, finance, healthcare, and critical infrastructure that rely heavily on Zoom for secure communications may face increased risk of data leakage. Although the vulnerability does not affect system integrity or availability, the exposure of confidential information can lead to reputational damage, regulatory penalties under GDPR, and potential exploitation by threat actors for espionage or targeted attacks. The requirement for user interaction reduces the likelihood of mass exploitation but targeted phishing campaigns could leverage this vulnerability effectively. Organizations with remote or hybrid workforces using Zoom extensively are particularly vulnerable. The lack of known exploits currently provides a window for proactive mitigation before active attacks emerge.
Mitigation Recommendations
1. Apply official patches or updates from Zoom as soon as they become available to remediate the vulnerability. 2. Until patches are released, restrict network access to Zoom Clients by implementing firewall rules that limit communication to trusted Zoom servers only. 3. Educate users to be cautious of unsolicited Zoom meeting links or messages that could trigger the vulnerability, emphasizing the risk of interacting with unknown or suspicious content. 4. Monitor network traffic and Zoom client logs for unusual file path requests or access patterns indicative of exploitation attempts. 5. Employ endpoint security solutions capable of detecting anomalous file access or path manipulation behaviors. 6. Consider deploying application whitelisting or sandboxing techniques to limit the Zoom Client’s ability to access arbitrary file paths. 7. Coordinate with IT and security teams to integrate Zoom client vulnerability management into broader patch management and incident response processes. 8. Review and enforce least privilege principles for user accounts to minimize potential impact if exploitation occurs.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden
CVE-2025-64739: CWE-73: External Control of File Name or Path in Zoom Communications Inc. Zoom Clients
Description
External control of file name or path in certain Zoom Clients may allow an unauthenticated user to conduct a disclosure of information via network access.
AI-Powered Analysis
Technical Analysis
CVE-2025-64739 is a vulnerability classified under CWE-73 (External Control of File Name or Path) affecting Zoom Communications Inc.'s Zoom Clients. The flaw allows an unauthenticated remote attacker to influence file names or paths used by the application, potentially leading to unauthorized disclosure of information over the network. Specifically, the vulnerability arises when the Zoom Client improperly handles externally supplied input that controls file path parameters, enabling attackers to access sensitive files or data that should otherwise be protected. The vulnerability does not require any privileges or prior authentication but does require user interaction, such as clicking a malicious link or opening a crafted Zoom message. The CVSS v3.1 base score is 4.3, indicating medium severity, with the vector AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N, meaning network attack vector, low attack complexity, no privileges required, user interaction required, unchanged scope, and only confidentiality impact. No known exploits have been reported in the wild as of the publication date. The affected versions are not explicitly listed but are referenced in vendor advisories. The vulnerability could allow attackers to disclose sensitive information from the victim's system by manipulating file paths used by Zoom Clients, potentially exposing private meeting data or user files. This type of vulnerability is critical to address in communication platforms due to their widespread use and access to sensitive information.
Potential Impact
For European organizations, this vulnerability poses a risk of unauthorized information disclosure, which can compromise confidentiality of sensitive communications, internal documents, or user data transmitted or stored via Zoom Clients. Sectors such as government, finance, healthcare, and critical infrastructure that rely heavily on Zoom for secure communications may face increased risk of data leakage. Although the vulnerability does not affect system integrity or availability, the exposure of confidential information can lead to reputational damage, regulatory penalties under GDPR, and potential exploitation by threat actors for espionage or targeted attacks. The requirement for user interaction reduces the likelihood of mass exploitation but targeted phishing campaigns could leverage this vulnerability effectively. Organizations with remote or hybrid workforces using Zoom extensively are particularly vulnerable. The lack of known exploits currently provides a window for proactive mitigation before active attacks emerge.
Mitigation Recommendations
1. Apply official patches or updates from Zoom as soon as they become available to remediate the vulnerability. 2. Until patches are released, restrict network access to Zoom Clients by implementing firewall rules that limit communication to trusted Zoom servers only. 3. Educate users to be cautious of unsolicited Zoom meeting links or messages that could trigger the vulnerability, emphasizing the risk of interacting with unknown or suspicious content. 4. Monitor network traffic and Zoom client logs for unusual file path requests or access patterns indicative of exploitation attempts. 5. Employ endpoint security solutions capable of detecting anomalous file access or path manipulation behaviors. 6. Consider deploying application whitelisting or sandboxing techniques to limit the Zoom Client’s ability to access arbitrary file paths. 7. Coordinate with IT and security teams to integrate Zoom client vulnerability management into broader patch management and incident response processes. 8. Review and enforce least privilege principles for user accounts to minimize potential impact if exploitation occurs.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Zoom
- Date Reserved
- 2025-11-10T19:56:35.266Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6915ee5ff690f81e3c76b575
Added to database: 11/13/2025, 2:42:39 PM
Last enriched: 11/13/2025, 2:57:45 PM
Last updated: 11/14/2025, 5:20:29 AM
Views: 12
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13161: CWE-23 Relative Path Traversal in IQ Service International IQ-Support
HighCVE-2025-13160: CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere in IQ Service International IQ-Support
MediumCVE-2025-9479: Out of bounds read in Google Chrome
UnknownCVE-2025-13107: Inappropriate implementation in Google Chrome
UnknownCVE-2025-13102: Inappropriate implementation in Google Chrome
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.