Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Vulnerabilities Patched by Juniper, VMware and Zoom 

Juniper Networks, VMware, and Zoom have announced patches for dozens of vulnerabilities across their products.

Vulnerabilities

Juniper Networks, VMware, and Zoom have published a total of ten security advisories describing dozens of vulnerabilities patched across their product portfolios.

Juniper on Tuesday announced fixes for nearly 90 bugs in third-party dependencies in Secure Analytics, the virtual appliance that collects security events from network devices, endpoints, and applications.

Patches for these issues, most of which were disclosed last year, were included in Secure Analytics version 7.5.0 UP11 IF03. Some of the flaws are dated 2016, 2019, and 2020, and three of them are rated ‘critical severity’.

VMware published two advisories dealing with a high-severity XSS defect in the VMware Aria automation appliance (tracked as CVE-2025-22249) and a medium-severity insecure file handling issue in VMware Tools (tracked as CVE-2025-22247).

The first vulnerability allows an attacker to steal the access token of a logged-in user by convincing the victim to click on a crafted link, while the second enables a threat actor with non-administrative privileges on a guest VM to modify local files and trigger insecure file operations within the VM.

Zoom on Tuesday released seven advisories detailing nine security defects in Zoom Workplace Apps across desktop and mobile platforms.

The most severe of the issues is CVE-2025-30663 (CVSS score of 8.8), a high-severity time-of-check time-of-use race condition that could allow a local, authenticated attacker to elevate their privileges.

The remaining eight flaws are medium-severity bugs that allow attackers to elevate privileges, cause denial of service (DoS), or impact application integrity.

Advertisement. Scroll to continue reading.

While Juniper, VMware, and Zoom make no mention of any of these vulnerabilities being exploited in the wild, users are advised to apply the fresh patches as soon as possible.

Related: Ivanti Patches Two EPMM Zero-Days Exploited to Hack Customers

Related: SAP Patches Another Exploited NetWeaver Vulnerability

Related: Adobe Patches Big Batch of Critical-Severity Software Flaws

Related: Radware Says Recently Disclosed WAF Bypasses Were Patched in 2023

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Learn how the LOtL threat landscape has evolved, why traditional endpoint hardening methods fall short, and how adaptive, user-aware approaches can reduce risk.

Watch Now

Join the summit to explore critical threats to public cloud infrastructure, APIs, and identity systems through discussions, case studies, and insights into emerging technologies like AI and LLMs.

Register

People on the Move

Cloud security startup Upwind has appointed Rinki Sethi as Chief Security Officer.

SAP security firm SecurityBridge announced the appointment of Roman Schubiger as the company’s new CRO.

Cybersecurity training and simulations provider SimSpace has appointed Peter Lee as Chief Executive Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.