Cyber Posture

CVE-2025-62484

High

Published: 13 November 2025

Published
13 November 2025
Modified
19 November 2025
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
EPSS Score 0.0009 25.4th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-62484 is a high-severity Inefficient Regular Expression Complexity (CWE-1333) vulnerability in Zoom Meeting Software Development Kit. Its CVSS base score is 8.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 25.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and RA-5 (Vulnerability Monitoring and Scanning).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires timely identification, reporting, and correction of flaws, directly addressing the inefficient regex vulnerability by mandating patches to Zoom Workplace Clients version 6.5.10 or later.

prevent

Validates incoming network inputs to the Zoom client to block or sanitize crafted regex patterns that trigger excessive computation and potential privilege escalation.

detect

Monitors and scans systems for vulnerabilities like CVE-2025-62484 to identify and prioritize remediation of affected Zoom Workplace Clients.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
Why these techniques?

The vulnerability is a client-side ReDoS flaw exploitable via crafted network input requiring user interaction, enabling client execution (T1203) and directly leading to privilege escalation (T1068).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

Inefficient regular expression complexity in certain Zoom Workplace Clients before version 6.5.10 may allow an unauthenticated user to conduct an escalation of privilege via network access.

Deeper analysisAI

CVE-2025-62484 is a high-severity vulnerability stemming from inefficient regular expression complexity (CWE-1333) in certain Zoom Workplace Clients prior to version 6.5.10. This flaw affects the client software, enabling potential exploitation through crafted network input that triggers excessive computation during regex processing, commonly known as a ReDoS (Regular Expression Denial of Service) condition adapted for privilege escalation.

An unauthenticated attacker (PR:N) with network access (AV:N) can exploit this vulnerability with low complexity (AC:L), though it requires user interaction (UI:R), such as a user clicking a malicious link or accepting a connection in a Zoom session. Successful exploitation leads to escalation of privilege, granting high confidentiality (C:H) and integrity (I:H) impacts without affecting availability (A:N) or changing scope (S:U), as scored at CVSS 8.1 (CVSS:3.1). The attacker could potentially manipulate client privileges to access sensitive data or alter application behavior.

Zoom's security bulletin (ZSB-25048) advises updating affected Zoom Workplace Clients to version 6.5.10 or later as the primary mitigation, addressing the regex inefficiency to prevent exploitation.

Details

CWE(s)

Affected Products

zoom
meeting software development kit
≤ 6.5.10 · ≤ 6.5.10
zoom
workplace
≤ 6.5.10 · ≤ 6.5.10

CVEs Like This One

CVE-2025-0150Same product: Zoom Meeting Software Development Kit
CVE-2025-0151Same product: Zoom Meeting Software Development Kit
CVE-2025-27440Same product: Zoom Meeting Software Development Kit
CVE-2025-27439Same product: Zoom Meeting Software Development Kit
CVE-2025-0147Same product: Zoom Meeting Software Development Kit
CVE-2024-45424Same product: Zoom Meeting Software Development Kit
CVE-2025-0149Same product: Zoom Meeting Software Development Kit
CVE-2025-49457Same product: Zoom Meeting Software Development Kit
CVE-2025-0145Same product: Zoom Meeting Software Development Kit
CVE-2024-45421Same product: Zoom Meeting Software Development Kit

References