CVE-2025-62483
📋 TL;DR
This vulnerability in Zoom Clients allows unauthenticated attackers to access sensitive information through network access due to improper data removal. It affects Zoom Client users running versions before 6.5.10. The issue enables information disclosure without requiring authentication.
💻 Affected Systems
- Zoom Client
📦 What is this software?
Rooms by Zoom
Rooms by Zoom
Rooms by Zoom
⚠️ Risk & Real-World Impact
Worst Case
Attackers could access sensitive meeting data, chat history, or user information that should have been removed from the client, potentially exposing confidential business discussions or personal information.
Likely Case
Limited information disclosure of residual data that wasn't properly cleared from memory or storage, potentially revealing meeting topics, participant names, or timestamps.
If Mitigated
With proper network segmentation and access controls, the impact is limited to internal network access only, reducing exposure to external attackers.
🎯 Exploit Status
The vulnerability requires network access to the target system but no authentication. Exploitation likely involves network requests to improperly exposed endpoints.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 6.5.10
Vendor Advisory: https://www.zoom.com/en/trust/security-bulletin/zsb-25047
Restart Required: Yes
Instructions:
1. Open Zoom Client. 2. Click your profile picture. 3. Select 'Check for Updates'. 4. If update to 6.5.10 is available, install it. 5. Restart Zoom Client after installation.
🔧 Temporary Workarounds
Network Segmentation
allRestrict network access to Zoom Clients to trusted networks only
Firewall Rules
allBlock unnecessary inbound connections to Zoom Client ports
🧯 If You Can't Patch
- Implement strict network access controls to limit who can reach Zoom Clients
- Monitor network traffic for unusual access patterns to Zoom Client endpoints
🔍 How to Verify
Check if Vulnerable:
Check Zoom Client version in Settings > About Zoom. If version is below 6.5.10, the system is vulnerable.
Check Version:
On Windows: "C:\Program Files\Zoom\bin\Zoom.exe" --version. On macOS: /Applications/zoom.us.app/Contents/MacOS/zoom.us --version. On Linux: zoom --version
Verify Fix Applied:
Confirm Zoom Client version is 6.5.10 or higher in Settings > About Zoom.
📡 Detection & Monitoring
Log Indicators:
- Unusual network connections to Zoom Client ports
- Multiple failed authentication attempts followed by successful data access
Network Indicators:
- Unexpected inbound connections to Zoom Client default ports
- Traffic patterns suggesting data exfiltration from Zoom processes
SIEM Query:
source="zoom" AND (event_type="connection" OR event_type="data_access") AND src_ip NOT IN [trusted_networks]