CVE-2025-30670

6.5 MEDIUM

📋 TL;DR

A null pointer dereference vulnerability in Zoom Workplace Apps for Windows allows authenticated users to cause denial of service through network access. This affects users running vulnerable versions of Zoom Workplace applications on Windows systems. The vulnerability requires authentication but can be exploited remotely.

💻 Affected Systems

Products:
  • Zoom Workplace Apps
Versions: Specific versions not detailed in reference; check Zoom security bulletin ZSB-25015 for exact affected versions
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows versions of Zoom Workplace Apps. Requires authenticated user access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete application crash leading to denial of service for Zoom Workplace functionality, potentially disrupting business communications and collaboration.

🟠

Likely Case

Application instability or crashes affecting individual users' Zoom Workplace applications, requiring restart of the application.

🟢

If Mitigated

Minimal impact with proper network segmentation and authentication controls limiting exploit attempts.

🌐 Internet-Facing: MEDIUM - Requires authenticated access but can be exploited remotely via network.
🏢 Internal Only: MEDIUM - Authenticated internal users could exploit to disrupt Zoom Workplace functionality.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but appears straightforward based on CWE-476 classification.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Zoom security bulletin ZSB-25015 for patched versions

Vendor Advisory: https://www.zoom.com/en/trust/security-bulletin/zsb-25015

Restart Required: Yes

Instructions:

1. Open Zoom Workplace application
2. Navigate to Settings > About
3. Check for updates or download latest version from Zoom website
4. Install update and restart application

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to Zoom Workplace applications to trusted networks only

Authentication Controls

all

Implement strong authentication mechanisms and monitor for suspicious authentication attempts

🧯 If You Can't Patch

  • Implement network segmentation to limit access to Zoom Workplace applications
  • Monitor for application crashes and investigate suspicious authentication patterns

🔍 How to Verify

Check if Vulnerable:

Check Zoom Workplace version against affected versions listed in ZSB-25015 security bulletin

Check Version:

In Zoom Workplace: Settings > About to view current version

Verify Fix Applied:

Verify Zoom Workplace version is updated to patched version specified in security bulletin

📡 Detection & Monitoring

Log Indicators:

  • Unexpected Zoom Workplace application crashes
  • Multiple authentication attempts from single source
  • Access logs showing network connections to Zoom Workplace services

Network Indicators:

  • Unusual network traffic patterns to Zoom Workplace ports
  • Multiple connection attempts from single IP addresses

SIEM Query:

source="zoom" AND (event_type="crash" OR event_type="error") AND process_name="Zoom Workplace"

🔗 References

📤 Share & Export