CVE-2025-49456

6.2 MEDIUM

📋 TL;DR

A race condition vulnerability in Zoom Client for Windows installers could allow an unauthenticated local attacker to compromise application integrity during installation. This affects users installing or updating Zoom on Windows systems. Attackers could potentially replace legitimate installation files with malicious ones.

💻 Affected Systems

Products:
  • Zoom Client for Windows
Versions: Specific versions not detailed in reference; check Zoom advisory ZSB-25029
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows installations; requires attacker to have local access during installation/update process.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could replace legitimate Zoom installation files with malicious executables, leading to complete system compromise, data theft, or persistent backdoor installation.

🟠

Likely Case

Local attacker modifies installation files to install malware or tamper with Zoom functionality, potentially leading to credential theft or surveillance.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to potential application corruption requiring reinstallation.

🌐 Internet-Facing: LOW - Requires local access to the target system during installation.
🏢 Internal Only: MEDIUM - Internal users with local access could exploit during Zoom installation/updates.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires precise timing during installation process and local system access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Zoom advisory ZSB-25029 for specific patched versions

Vendor Advisory: https://www.zoom.com/en/trust/security-bulletin/zsb-25029

Restart Required: No

Instructions:

1. Visit Zoom's security bulletin ZSB-25029. 2. Download and install the latest patched version of Zoom Client for Windows. 3. Verify installation completes successfully.

🔧 Temporary Workarounds

Restrict local access during installation

windows

Ensure only authorized users have physical or remote access to systems during Zoom installation/updates.

Verify installer integrity

windows

Download Zoom installer directly from official Zoom website and verify checksums before installation.

🧯 If You Can't Patch

  • Restrict physical and remote access to systems during installation periods
  • Monitor for unauthorized file modifications in Zoom installation directories

🔍 How to Verify

Check if Vulnerable:

Check Zoom version against affected versions listed in Zoom advisory ZSB-25029

Check Version:

Open Zoom client, click profile picture → Help → About Zoom

Verify Fix Applied:

Verify Zoom version is updated to patched version specified in Zoom advisory

📡 Detection & Monitoring

Log Indicators:

  • Unexpected file modifications in Zoom installation directories during installation
  • Multiple installation attempts in short timeframes

Network Indicators:

  • Unusual network traffic from Zoom process post-installation

SIEM Query:

Process creation events for Zoom installer followed by unexpected file modifications in Program Files\Zoom

🔗 References

📤 Share & Export