Zoom Patches Four High-Severity Vulnerabilities | How Attackers Exploit Them and How to Stay Safe

Zoom recently patched five security vulnerabilities, four of which were classified as high severity. These flaws, identified as CVE-2025-27440, CVE-2025-27439, CVE-2025-0151, and CVE-2025-0150, could allow attackers to escalate privileges, disrupt services, and execute denial-of-service (DoS) attacks. The vulnerabilities primarily impact Zoom Workplace, Zoom Rooms Controller, Zoom Rooms Client, and Zoom Meeting SDK versions prior to 6.3.0. Attackers exploit these flaws through memory-related issues and improper data verification, enabling unauthorized access and system crashes. To stay protected, users must update their Zoom applications to the latest version (6.3.0 or later), enable security features like two-factor authentication, and follow best practices for safe online communication.

Zoom Patches Four High-Severity Vulnerabilities | How Attackers Exploit Them and How to Stay Safe

Table of Contents

Introduction

Zoom, a leading video conferencing platform, recently fixed five security vulnerabilities, four of which were classified as high severity. These vulnerabilities could allow attackers to escalate privileges, cause service disruptions, or execute denial-of-service (DoS) attacks.

Understanding how these vulnerabilities work, what they impact, and how to protect yourself is crucial for ensuring secure video conferencing and online collaboration.

What Exactly Happened?

Zoom identified and patched security vulnerabilities in multiple products, including Zoom Workplace, Zoom Rooms Controller, Zoom Rooms Client, and Zoom Meeting SDK.

These vulnerabilities, tracked as CVE-2025-27440, CVE-2025-27439, CVE-2025-0151, and CVE-2025-0150, were discovered by Zoom’s offensive security team during internal security assessments.

The flaws primarily affect memory handling and data verification processes, which could be exploited by attackers with network access.

Understanding the Vulnerabilities

High-Severity Vulnerabilities

1. CVE-2025-27440, CVE-2025-27439, CVE-2025-0151

  • These vulnerabilities are memory-related issues.
  • They can be exploited by an attacker to escalate privileges (gain higher access to a system).
  • An attacker needs authentication credentials to exploit these flaws.
  • These vulnerabilities exist in Zoom Workplace, Zoom Rooms Controller, Zoom Rooms Client, and Meeting SDK (prior to version 6.3.0).

How They Work:
Attackers exploit weaknesses in memory allocation and handling. If the system fails to manage memory correctly, a hacker could overwrite or inject malicious code into memory, gaining elevated access to system functions.

2. CVE-2025-0150

  • This vulnerability affects Zoom Workplace app and Meeting SDK for iOS.
  • It allows an authenticated attacker to trigger denial-of-service (DoS) attacks.

How It Works:
By sending maliciously crafted data packets, an attacker can overload the system, causing it to crash or become unresponsive. This results in service disruptions and prevents users from accessing Zoom meetings.

Medium-Severity Vulnerability

  • This flaw affects Zoom applications before version 6.3.0.
  • It relates to improper verification of data authenticity.
  • It can be exploited by an unprivileged attacker to perform DoS attacks.

How It Works:
An attacker manipulates data packets to bypass security checks, causing the system to process corrupted or fake data, leading to service disruptions or crashes.

Affected Products and Versions

Affected Product Vulnerable Versions Patched Version
Zoom Workplace Prior to 6.3.0 6.3.0 and later
Zoom Rooms Controller Prior to 6.3.0 6.3.0 and later
Zoom Rooms Client Prior to 6.3.0 6.3.0 and later
Zoom Meeting SDK Prior to 6.3.0 6.3.0 and later

To stay protected, users must update their Zoom applications to version 6.3.0 or later.

How to Protect Yourself

To ensure security and prevent exploitation of these vulnerabilities, follow these steps:

  • Update Zoom Immediately: Always use the latest version (6.3.0 or later) to ensure patched vulnerabilities.
  • Enable Two-Factor Authentication (2FA): Adds an extra layer of security to Zoom accounts.
  • Monitor Security Bulletins: Stay informed about Zoom’s security updates through their official security page.
  • Use Strong Passwords: Ensure Zoom accounts and meetings are secured with strong passwords to prevent unauthorized access.
  • Limit Meeting Access: Restrict meeting access using waiting rooms and passcodes to reduce unauthorized entry.

Conclusion

Zoom’s recent high-severity vulnerabilities highlight the importance of regular security updates and proactive cybersecurity measures. These flaws, if left unpatched, could lead to privilege escalation, service disruptions, or denial-of-service (DoS) attacks.

To stay protected, users and organizations should immediately update their Zoom applications and follow security best practices. Staying informed and implementing strong cybersecurity policies ensures safe and secure online communication.

FAQs

What are the recent security vulnerabilities in Zoom?

Zoom recently patched five vulnerabilities, including four high-severity flaws that could lead to privilege escalation and denial-of-service (DoS) attacks.

What are the CVE identifiers for these vulnerabilities?

The high-severity vulnerabilities are tracked as CVE-2025-27440, CVE-2025-27439, CVE-2025-0151, and CVE-2025-0150.

How do these vulnerabilities affect Zoom users?

They could allow attackers to gain elevated privileges, disrupt services, and crash applications if exploited.

Which Zoom products are affected?

The vulnerabilities impact Zoom Workplace, Zoom Rooms Controller, Zoom Rooms Client, and Zoom Meeting SDK.

What version of Zoom is vulnerable?

Versions prior to 6.3.0 are affected by these security flaws.

How can an attacker exploit these vulnerabilities?

By exploiting memory-related weaknesses and improper data verification, attackers can manipulate Zoom’s internal processes to gain access or disrupt services.

Do attackers need authentication to exploit these flaws?

Yes, the high-severity vulnerabilities require authentication for exploitation.

What is privilege escalation?

Privilege escalation is a technique where an attacker gains higher access rights than they are supposed to have, allowing them to execute harmful actions.

What is a denial-of-service (DoS) attack?

A DoS attack is an attempt to overload a system, causing it to crash or become unresponsive, preventing legitimate users from accessing services.

How does CVE-2025-27440 affect Zoom?

This vulnerability exploits a memory-related issue that can be used to escalate privileges, giving an attacker unauthorized control over a system.

What is the impact of CVE-2025-27439?

This flaw is another memory-related issue that attackers can use to gain elevated privileges within the affected Zoom applications.

How does CVE-2025-0151 work?

It allows an attacker with network access to manipulate memory allocation, potentially leading to unauthorized actions or service disruptions.

What is the risk associated with CVE-2025-0150?

This vulnerability allows an attacker to cause denial-of-service (DoS) attacks on the Zoom Workplace app and Meeting SDK for iOS.

Is there a medium-severity vulnerability in Zoom?

Yes, a medium-severity vulnerability related to improper data verification can be exploited for DoS attacks.

How can users protect themselves from these vulnerabilities?

Users should update to Zoom version 6.3.0 or later, enable two-factor authentication, and restrict meeting access.

Where can users download the patched version of Zoom?

Users can download the latest version from the official Zoom website or update through their application settings.

How can organizations ensure their Zoom meetings are secure?

Organizations should enforce strong passwords, enable waiting rooms, restrict screen sharing, and monitor security updates.

Does Zoom regularly patch security flaws?

Yes, Zoom continuously improves security by identifying and patching vulnerabilities through updates.

How often should users update Zoom?

Users should check for updates regularly and apply them as soon as they are available.

What happens if a user doesn’t update Zoom?

If left unpatched, users remain vulnerable to exploitation, putting their data and meetings at risk.

Are there any reported attacks exploiting these vulnerabilities?

As of now, there are no confirmed reports of real-world attacks exploiting these vulnerabilities.

Can free Zoom accounts be affected by these vulnerabilities?

Yes, both free and paid Zoom accounts can be impacted if they are using vulnerable versions.

How can businesses mitigate risks associated with Zoom vulnerabilities?

Businesses should enforce security policies, update applications promptly, and educate employees on cybersecurity best practices.

Can an antivirus program protect against these vulnerabilities?

Antivirus software may provide some protection, but updating Zoom is the most effective way to stay secure.

What security measures does Zoom use to protect users?

Zoom implements encryption, authentication controls, and regular security patches to enhance protection.

How does Zoom discover these vulnerabilities?

Zoom has an internal offensive security team that identifies and fixes security flaws through rigorous testing.

Will Zoom notify users of security updates?

Yes, Zoom sends notifications about important security patches and updates through its official channels.

How does encryption help in securing Zoom meetings?

Encryption ensures that meeting data is protected from unauthorized access during transmission.

What other steps can users take for better Zoom security?

Users should avoid sharing meeting links publicly, use unique meeting IDs, and enable end-to-end encryption whenever possible.

Join Our Upcoming Class! Click Here to Join
Join Our Upcoming Class! Click Here to Join