Critical Zoom windows client vulnerabilities enable privilege escalation
Take action: The flaws are not trivial to abuse since they require local presence on the computer and specific conditions. On the other hand, Zoom tools are mostly trivial to upgrade. So just update Zoom and carry on. The "how scary it is" debate is useless.
Learn More
Zoom has patched multiple vulnerabilities affecting its Windows-based client applications, including a critical flaw that allows unauthenticated attackers to escalate privileges remotely.
Vulnerabilities summary:
- CVE-2025-49457 (CVSS score 9.6) Untrusted search path vulnerability in Zoom Clients for Windows. The vulnerability is caused by improper handling of DLL search paths within the Zoom client software. When the Zoom client loads dynamic link libraries without specifying absolute paths, Windows follows its standard search order, which includes the application's directory, system directories, and any directories listed in the PATH environment variable. This design flaw creates an opportunity for attackers to place malicious DLL files in locations that are searched before legitimate libraries, causing the Zoom client to load and execute malicious code with the application's privileges.
- CVE-2025-49456 (CVSS score 6.2) A race condition in the installer for certain Zoom Clients for Windows. According to Zoom, it "may allow an unauthenticated user to impact application integrity via local access". This race condition vulnerability could enable local attackers to manipulate the installation process, potentially altering or replacing application files before they are properly secured during the installation phase.
Affected versions:
- Zoom Workplace for Windows before version 6.3.10,
- Zoom Workplace VDI for Windows before version 6.3.10 (except 6.1.16 and 6.2.12),
- Zoom Rooms for Windows before version 6.3.10,
- Zoom Rooms Controller for Windows before version 6.3.10,
- Zoom Meeting SDK for Windows before version 6.3.10
Organizations using Zoom Workplace, Zoom Rooms or are building custom applications with the Zoom Meeting SDK should plan updating.
Zoom has released updated versions of all affected products to address both vulnerabilities. Users can help keep themselves secure by applying the latest updates available at https://zoom.us/download.