Zoom releases multiple patches for Windows and macOS clients, at least one critical
Take action: If you're using Zoom products on Windows or macOS, update to the latest version (6.3.10 or newer). Prioritize Windows systems first since they face the highest risk (critical flaw), and ensure all Zoom products including Workplace, Rooms, and VDI clients are updated across your organization.
Learn More
Zoom released patches for multiple vulnerabilities across its Windows and macOS client applications, Workplace platform, and various specialized products.
Vulnerability summary:
- CVE-2025-49457 (CVSS score 9.6) an untrusted search path vulnerability in Zoom Clients for Windows. This vulnerability allows an unauthenticated user to conduct privilege escalation attacks via network access, exploiting the application's improper handling of search paths during startup processes. Affected products include:
- Zoom Workplace for Windows before version 6.3.10,
- Zoom Workplace VDI for Windows before version 6.3.10 (with specific version requirements for different tracks including 6.1.16 and 6.2.12),
- Zoom Rooms for Windows before version 6.3.10,
- Zoom Rooms Controller for Windows before version 6.3.10,
- Zoom Meeting SDK for Windows before version 6.3.10.
- CVE-2025-58131 (CVSS score 6.6) - Race Condition vulnerability in VMware Horizon VDI Plugin for macOS Universal installer
- CVE-2025-49458 (CVSS score 6.5) - Buffer Overflow vulnerability that could lead to arbitrary code execution
- CVE-2025-58135 (CVSS score 5.3) - Improper Action Enforcement vulnerability in Windows Workplace Clients
- CVE-2025-58134 (CVSS score 4.3) - Incorrect Authorization flaw in Windows Workplace Clients
- CVE-2025-49460 (CVSS score 4.3) - Argument Injection vulnerability allowing manipulation of application behavior
- CVE-2025-49461 (CVSS score 4.3) - Cross-site Scripting (XSS) flaw enabling script injection
Zoom strongly recommends that all users and administrators apply these security updates using the built-in update mechanisms within Zoom applications or through enterprise software distribution systems
No information has been disclosed regarding active exploitation of these vulnerabilities in the wild.