CVE-2025-49463
📋 TL;DR
An information disclosure vulnerability in Zoom iOS clients allows unauthenticated attackers to access sensitive information via network access. This affects Zoom iOS app users running versions before 6.4.5. The vulnerability stems from insufficient control flow management.
💻 Affected Systems
- Zoom Client for iOS
📦 What is this software?
Zoom by Zoom
⚠️ Risk & Real-World Impact
Worst Case
Attackers could access sensitive meeting information, user data, or authentication tokens from vulnerable devices on the same network.
Likely Case
Information leakage of meeting details, participant lists, or limited user metadata to network-adjacent attackers.
If Mitigated
Minimal impact with proper network segmentation and updated clients.
🎯 Exploit Status
Requires network access to the vulnerable device; no authentication needed.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 6.4.5
Vendor Advisory: https://www.zoom.com/en/trust/security-bulletin/zsb-25026/
Restart Required: Yes
Instructions:
1. Open the App Store on your iOS device. 2. Search for 'Zoom'. 3. Tap 'Update' next to Zoom app. 4. Wait for update to complete. 5. Restart the Zoom app.
🔧 Temporary Workarounds
Network Segmentation
allIsolate iOS devices using Zoom from untrusted networks
Disable Zoom on Untrusted Networks
iosPrevent Zoom iOS app from running on public or untrusted Wi-Fi networks
🧯 If You Can't Patch
- Restrict Zoom iOS app usage to trusted, segmented networks only
- Implement network monitoring for unusual data exfiltration patterns from iOS devices
🔍 How to Verify
Check if Vulnerable:
Check Zoom app version in iOS Settings > Zoom > Version. If version is below 6.4.5, device is vulnerable.
Check Version:
Not applicable for iOS; check via Settings app
Verify Fix Applied:
Confirm Zoom app version shows 6.4.5 or higher in iOS Settings.
📡 Detection & Monitoring
Log Indicators:
- Unusual network connections from iOS devices running Zoom
- Multiple failed authentication attempts followed by successful data access
Network Indicators:
- Unexpected data flows from iOS devices on port 8801 (Zoom default)
- Unusual outbound traffic patterns from iOS devices during Zoom sessions
SIEM Query:
source="ios_device" AND app="zoom" AND (event="network_access" OR event="data_transfer") AND version<"6.4.5"