CVE-2025-30669

4.8 MEDIUM

📋 TL;DR

This vulnerability in Zoom Clients involves improper certificate validation that could allow an unauthenticated attacker on the same network to potentially access sensitive information. It affects Zoom users on vulnerable client versions, requiring the attacker to be on the same local network segment as the target.

💻 Affected Systems

Products:
  • Zoom Client
Versions: Specific versions not detailed in reference; check Zoom advisory ZSB-25044
Operating Systems: Windows, macOS, Linux, iOS, Android
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations of affected Zoom Client versions are vulnerable. Requires attacker to be on same network segment.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could intercept and decrypt sensitive Zoom meeting data, potentially exposing confidential conversations, shared files, or authentication tokens.

🟠

Likely Case

Limited information disclosure of non-critical data transmitted during Zoom sessions, such as metadata or partial session information.

🟢

If Mitigated

Minimal impact with proper network segmentation and updated clients, as the attack requires adjacent network access.

🌐 Internet-Facing: LOW - Attack requires adjacent network access, not remote internet exploitation.
🏢 Internal Only: MEDIUM - Attackers on the same internal network could exploit this vulnerability to intercept Zoom traffic.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires network positioning and certificate manipulation skills, but no authentication is needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Zoom advisory ZSB-25044 for specific patched versions

Vendor Advisory: https://www.zoom.com/en/trust/security-bulletin/zsb-25044

Restart Required: Yes

Instructions:

1. Open Zoom Client. 2. Click profile icon → Check for Updates. 3. Install any available updates. 4. Restart Zoom Client.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Zoom traffic to trusted network segments to prevent adjacent access attacks

VPN Usage

all

Require Zoom usage through VPN to encrypt all traffic and prevent local network interception

🧯 If You Can't Patch

  • Restrict Zoom usage to trusted, segmented networks only
  • Monitor network traffic for unusual certificate validation patterns

🔍 How to Verify

Check if Vulnerable:

Check Zoom Client version against affected versions in Zoom advisory ZSB-25044

Check Version:

In Zoom Client: Click profile icon → About → Check version number

Verify Fix Applied:

Verify Zoom Client is updated to version specified in Zoom advisory as patched

📡 Detection & Monitoring

Log Indicators:

  • Failed certificate validation events in Zoom logs
  • Unexpected certificate authority changes

Network Indicators:

  • Unusual certificate validation traffic patterns
  • Man-in-the-middle attack signatures on Zoom ports

SIEM Query:

source="zoom" AND (event="certificate_validation_failed" OR event="ssl_error")

🔗 References

📤 Share & Export