CYBERNEWSMEDIA Network:||
AD · 970×250

Vulnerabilities

Vulnerabilities Patched by Juniper, VMware and Zoom

Juniper Networks, VMware, and Zoom have announced patches for dozens of vulnerabilities across their products. The post Vulnerabilities Patched by Juniper, VMware and Zoom appeared first on SecurityWeek.

DNS Vulnerabilities

Juniper Networks, VMware, and Zoom have published a total of ten security advisories describing dozens of vulnerabilities patched across their product portfolios.

Juniper on Tuesday announced fixes for nearly 90 bugs in third-party dependencies in Secure Analytics, the virtual appliance that collects security events from network devices, endpoints, and applications.

Patches for these issues, most of which were disclosed last year, were included in Secure Analytics version 7.5.0 UP11 IF03. Some of the flaws are dated 2016, 2019, and 2020, and three of them are rated ‘critical severity’.

VMware published two advisories dealing with a high-severity XSS defect in the VMware Aria automation appliance (tracked as CVE-2025-22249) and a medium-severity insecure file handling issue in VMware Tools (tracked as CVE-2025-22247).

The first vulnerability allows an attacker to steal the access token of a logged-in user by convincing the victim to click on a crafted link, while the second enables a threat actor with non-administrative privileges on a guest VM to modify local files and trigger insecure file operations within the VM.

Zoom on Tuesday released seven advisories detailing nine security defects in Zoom Workplace Apps across desktop and mobile platforms.

The most severe of the issues is CVE-2025-30663 (CVSS score of 8.8), a high-severity time-of-check time-of-use race condition that could allow a local, authenticated attacker to elevate their privileges.

The remaining eight flaws are medium-severity bugs that allow attackers to elevate privileges, cause denial of service (DoS), or impact application integrity.

While Juniper, VMware, and Zoom make no mention of any of these vulnerabilities being exploited in the wild, users are advised to apply the fresh patches as soon as possible.

Related: Ivanti Patches Two EPMM Zero-Days Exploited to Hack Customers

Related: SAP Patches Another Exploited NetWeaver Vulnerability

Related: Adobe Patches Big Batch of Critical-Severity Software Flaws

Related: Radware Says Recently Disclosed WAF Bypasses Were Patched in 2023

Latest News

CYBERNEWSMEDIAPublisher