Zoom, Xerox Patch Critical Windows Flaws Enabling Remote Attacks

  • Zoom and Xerox resolved major software vulnerabilities that could enable attackers to gain higher system privileges or run unauthorized code.
  • The Zoom flaw, labeled CVE-2025-49457 (CVSS 9.6), affects Windows users and involves untrusted search paths, allowing privilege escalation.
  • Several Zoom Windows products released before version 6.3.10 are impacted and updates have been released.
  • Xerox FreeFlow Core had two severe issues, CVE-2025-8355 (XML injection) and CVE-2025-8356 (path traversal), potentially leading to remote code execution. A patch is available in version 8.0.4.
  • Security experts warn these issues are simple to exploit and could allow attackers to access sensitive information or move within corporate networks.

Zoom and Xerox have fixed two major security problems in widely used software, officials said this week. The flaws could have let Hackers gain higher access than allowed or run malicious programs. Both companies took swift action to address the risks.

- Advertisement -

The Zoom vulnerability, tracked as CVE-2025-49457 and scoring 9.6 out of 10 on the severity scale (CVSS), impacts Windows users. According to a security bulletin from Zoom, the flaw permits unauthorized users to escalate their privileges via network access because of an “untrusted search path.” This means attackers could run apps with higher system rights than allowed.

The company’s report, based on findings by its own Offensive Security team, outlined which products are affected. These include Zoom Workplace for Windows, Zoom Workplace VDI for Windows, Zoom Rooms for Windows, Zoom Rooms Controller for Windows, and Zoom Meeting SDK for Windows, all before version 6.3.10. Users are urged to update to the latest version to minimize risk.

Xerox also patched several issues in FreeFlow Core software. As explained in a security notice, the most serious flaws are CVE-2025-8355, an XML External Entity (XXE) injection which can lead to server-side request forgery (SSRF), and CVE-2025-8356, a path traversal issue that could allow remote code execution. These problems have been resolved with the release of version 8.0.4.

According to security firm Horizon3.ai, “These vulnerabilities are rudimentary to exploit and if exploited, could allow an attacker to execute arbitrary commands on the affected system, steal sensitive data, or attempt to move laterally into a given corporate environment to further their attack.”

- Advertisement -

The vulnerabilities highlight ongoing risks in widely used business software. Updates are available and users are strongly advised to apply patches immediately. No reports of public exploitation were mentioned in the companies’ statements.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Woz’s Crypto Token Plummets 99.9%

Efforce, an energy efficiency token project co-founded by Apple's Steve Wozniak, has lost over...

Ethereum Foundation Releases Mandate for Decentralized Future

The Ethereum Foundation published a mandate stating its core principles of censorship resistance, open...

INTERPOL: 45K Malicious Servers Seized

INTERPOL's third phase of Operation Synergia led to the takedown of 45,000 malicious IP...

Canada Job Losses Deepen, Rate Hits 6.7% in Feb

Canada's economy lost 83,900 jobs in February 2026, causing the unemployment rate to jump...

Story Protocol Developer PIP Labs Cuts Jobs Amid AI Shift

PIP Labs, developer of the Story Protocol blockchain, has laid off several employees and...

Must Read

Best Metaverse Tokens to Buy on Binance for 10X Gains

Ever since Facebook renamed their company to Meta, as well as their plans to build a metaverse where we can travel into using Virtual...