CVE-2025-0149

6.5 MEDIUM

📋 TL;DR

This vulnerability in Zoom Workplace Apps allows unprivileged users to cause denial of service attacks by exploiting insufficient data authenticity verification. Attackers can disrupt Zoom services via network access without requiring authentication. All users running vulnerable versions of Zoom Workplace Apps are affected.

💻 Affected Systems

Products:
  • Zoom Workplace Apps
Versions: Specific versions not detailed in reference; consult Zoom advisory ZSB-25008 for exact affected versions
Operating Systems: Windows, macOS, Linux, iOS, Android
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability affects Zoom Workplace Apps specifically; requires network access to exploit

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete disruption of Zoom Workplace services, rendering communication and collaboration tools unavailable for extended periods across an organization.

🟠

Likely Case

Temporary service degradation or intermittent outages affecting specific Zoom Workplace features or user sessions.

🟢

If Mitigated

Minimal impact with proper network segmentation and monitoring, potentially causing brief service interruptions that are quickly detected and contained.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access but no authentication, making it accessible to unprivileged users

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Zoom advisory ZSB-25008 for specific patched versions

Vendor Advisory: https://www.zoom.com/en/trust/security-bulletin/zsb-25008/

Restart Required: Yes

Instructions:

1. Visit Zoom advisory ZSB-25008. 2. Identify affected versions. 3. Update Zoom Workplace Apps to latest version. 4. Restart applications. 5. Verify update completion.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to Zoom Workplace Apps to trusted networks only

Rate Limiting

all

Implement network rate limiting to reduce impact of DoS attempts

🧯 If You Can't Patch

  • Implement strict network access controls to limit exposure
  • Deploy additional monitoring and alerting for unusual Zoom traffic patterns

🔍 How to Verify

Check if Vulnerable:

Check Zoom Workplace App version against affected versions listed in ZSB-25008 advisory

Check Version:

In Zoom app: Settings > About > Version

Verify Fix Applied:

Confirm Zoom Workplace App version is updated beyond affected versions listed in advisory

📡 Detection & Monitoring

Log Indicators:

  • Unusual spike in Zoom network traffic
  • Multiple failed connection attempts
  • Service interruption logs

Network Indicators:

  • Abnormal Zoom protocol traffic patterns
  • High volume of requests from single sources

SIEM Query:

source="zoom" AND (event_type="connection_error" OR bytes_out>threshold) | stats count by src_ip

🔗 References

📤 Share & Export