Loading cryptocurrency prices...

Zoom, Xerox Patch Critical Windows Flaws Enabling Remote Attacks

  • Zoom and Xerox resolved major software vulnerabilities that could enable attackers to gain higher system privileges or run unauthorized code.
  • The Zoom flaw, labeled CVE-2025-49457 (CVSS 9.6), affects Windows users and involves untrusted search paths, allowing privilege escalation.
  • Several Zoom Windows products released before version 6.3.10 are impacted and updates have been released.
  • Xerox FreeFlow Core had two severe issues, CVE-2025-8355 (XML injection) and CVE-2025-8356 (path traversal), potentially leading to remote code execution. A patch is available in version 8.0.4.
  • Security experts warn these issues are simple to exploit and could allow attackers to access sensitive information or move within corporate networks.

Zoom and Xerox have fixed two major security problems in widely used software, officials said this week. The flaws could have let Hackers gain higher access than allowed or run malicious programs. Both companies took swift action to address the risks.

- Advertisement -

The Zoom vulnerability, tracked as CVE-2025-49457 and scoring 9.6 out of 10 on the severity scale (CVSS), impacts Windows users. According to a security bulletin from Zoom, the flaw permits unauthorized users to escalate their privileges via network access because of an “untrusted search path.” This means attackers could run apps with higher system rights than allowed.

The company’s report, based on findings by its own Offensive Security team, outlined which products are affected. These include Zoom Workplace for Windows, Zoom Workplace VDI for Windows, Zoom Rooms for Windows, Zoom Rooms Controller for Windows, and Zoom Meeting SDK for Windows, all before version 6.3.10. Users are urged to update to the latest version to minimize risk.

Xerox also patched several issues in FreeFlow Core software. As explained in a security notice, the most serious flaws are CVE-2025-8355, an XML External Entity (XXE) injection which can lead to server-side request forgery (SSRF), and CVE-2025-8356, a path traversal issue that could allow remote code execution. These problems have been resolved with the release of version 8.0.4.

According to security firm Horizon3.ai, “These vulnerabilities are rudimentary to exploit and if exploited, could allow an attacker to execute arbitrary commands on the affected system, steal sensitive data, or attempt to move laterally into a given corporate environment to further their attack.”

- Advertisement -

The vulnerabilities highlight ongoing risks in widely used business software. Updates are available and users are strongly advised to apply patches immediately. No reports of public exploitation were mentioned in the companies’ statements.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

IBM Unveils 120-Qubit Nighthawk Chip, Aiming for Quantum Advantage by 2026

IBM unveiled the Nighthawk and Quantum Loon quantum processors, marking significant progress toward verified...

Nvidia Eyes $200 Return Amid AI Growth and Strategic Deals

NVIDIA stock has encountered resistance near $200 but rose 5% over the last month...

JPMorgan Expands JPM Coin to Base, Eyes Retail and Multi-Currency Use

JPMorgan has launched its dollar-backed stablecoin, JPM Coin (JPMD), for institutional transfers on the...

Report: 16 Blockchains Have Built-in Fund Freezing Mechanisms

Sixteen blockchains have built-in fund freezing features, while 19 more can add this with...

Peraire-Bueno Bros Face Retrial in $25M Ethereum Fraud Case

Anton and James Peraire-Bueno face a potential retrial for alleged fraud and money laundering...
- Advertisement -

Must Read

What Is Bcrypt Password Hashing Function?

KEY TAKEAWAYSBcrypt is a password hashing function that transforms plain passwords into unique alphanumeric sequences.It is a one-way process, ensuring that passwords cannot be...