Zoom and Xerox Release Urgent Security Updates to Address Privilege Escalation and RCE Vulnerabilities

Aug 13, 2025
Vulnerability / Software Security

Zoom and Xerox have released critical security updates for Zoom Clients on Windows and FreeFlow Core, addressing significant vulnerabilities that could enable privilege escalation and remote code execution (RCE). The flaw in Zoom Clients for Windows, designated as CVE-2025-49457 (CVSS score: 9.6), involves an untrusted search path that may allow an unauthenticated user to escalate privileges via network access.

According to a security bulletin issued by Zoom, the issue was identified by its Offensive Security team and affects the following products:

  • Zoom Workplace for Windows versions prior to 6.3.10
  • Zoom Workplace VDI for Windows versions prior to 6.3.10 (excluding 6.1.16 and 6.2.12)
  • Zoom Rooms for Windows versions prior to 6.3.10
  • Zoom Rooms Controller for Windows versions prior to 6.3.10
  • Zoom Meeting SDK for Windows versions prior to 6.3.10

This disclosure follows the identification of multiple vulnerabilities in critical software platforms.

Zoom and Xerox Patch Serious Security Vulnerabilities

On August 13, 2025, both Zoom and Xerox announced critical updates aimed at mitigating two significant security vulnerabilities found in their respective products. The flaws, affecting Zoom Clients for Windows and Xerox’s FreeFlow Core, present risks of privilege escalation and remote code execution.

The vulnerability associated with Zoom Clients for Windows, designated CVE-2025-49457, has received a high severity score of 9.6 on the Common Vulnerability Scoring System (CVSS). The issue stems from an untrusted search path that enables an unauthenticated user to leverage network access for privilege escalation. In a security bulletin released on Tuesday, Zoom detailed that this vulnerability impacts several versions of their software, including Zoom Workplace for Windows and Zoom Rooms, all prior to version 6.3.10, with certain exceptions.

The identification of this vulnerability originated from internal assessments conducted by Zoom’s Offensive Security team. It has been confirmed that the issue could potentially allow attackers to exploit these weaknesses, thereby gaining elevated privileges within affected systems. This scenario is particularly troubling for businesses, as the implications of such vulnerabilities could lead to unauthorized access and data breaches, not just within Zoom’s ecosystem but also extending to interconnected systems in organizational networks.

Companies utilizing Zoom’s platform for remote work, video communications, and online meetings should prioritize the implementation of these security patches to prevent any potential exploitation. The targeted versions are widely utilized in a variety of sectors, thereby increasing the risk profile for many organizations. Both Zoom and Xerox are based in the United States, highlighting the domestic cybersecurity risks that business owners must navigate.

From a cybersecurity perspective, this incident can be analyzed through the lens of the MITRE ATT&CK framework. The tactics of privilege escalation and initial access are particularly relevant, as adversaries may have exploited these vulnerabilities to gain footholds in organizational environments. Such behavior is characteristic of a structured attack vector that seeks both persistence within systems and control over targeted networks.

The criticality of this situation reinforces the need for businesses to remain vigilant regarding software updates and vulnerabilities. Awareness and prompt action can prevent potential breaches, thereby safeguarding sensitive information and maintaining organizational integrity. As cyber threats continue to evolve, the responsibility falls on business owners to ensure their defenses are robust and up-to-date.

Source link