Subscribe

Keep Up to Date with the Most Important News

By pressing the Subscribe button, you confirm that you have read and are agreeing to our Privacy Policy and Terms of Service

Zoom, VMware, Juniper Rush to Get Vulnerabilities Patched

Zoom, VMware, Juniper Rush to Get Vulnerabilities Patched Zoom, VMware, Juniper Rush to Get Vulnerabilities Patched
IMAGE CREDITS: ALPINE SECURITY

Vulnerabilities patched across major platforms are raising alarms this week as Juniper Networks, VMware, and Zoom release a new wave of security updates. These patches target dozens of flaws that, if left unresolved, could expose users to data theft, system compromise, or service disruption.

Juniper Networks announced one of the largest updates. The company addressed nearly 90 vulnerabilities found in third-party components. These flaws affected Secure Analytics, a virtual appliance used by businesses to collect and analyze security events. It pulls data from network devices, endpoints, and applications.

The fixes appear in Secure Analytics version 7.5.0 UP11 IF03. Many of the bugs were originally disclosed as far back as 2016, 2019, and 2020. However, they remained unpatched until now. At least three of them were marked as critical, meaning they posed a high risk to enterprise networks.

Unlike new vulnerabilities that attackers may not know about, these older ones have had years to become well-documented. This increases the chance that someone, somewhere, may have already found ways to exploit them. Juniper’s patch release helps close that gap, but only if organizations move quickly to install it.

VMware also issued two new security advisories. The first involves a high-severity cross-site scripting (XSS) vulnerability in its Aria Automation appliance. It’s tracked as CVE-2025-22249. This flaw lets attackers steal session tokens from logged-in users. All they need to do is convince someone to click a malicious link.

The second vulnerability affects VMware Tools. This bug, CVE-2025-22247, allows local users without admin rights to manipulate files inside guest virtual machines. That opens the door to insecure file operations, which could lead to data tampering or even system instability. While it’s classified as medium-severity, the potential impact in enterprise environments makes it a serious concern.

Zoom joined the patch parade with updates targeting nine vulnerabilities across its Zoom Workplace Apps. These bugs affect both desktop and mobile platforms. Zoom published seven separate advisories to document the issues.

The most dangerous flaw is CVE-2025-30663. It scored 8.8 on the CVSS severity scale. This high-risk vulnerability is a race condition—a timing-related bug that occurs when two processes interfere with each other. In this case, it could allow a logged-in attacker to escalate their privileges. That means someone with basic access could gain much deeper control over the app or device.

The other eight bugs in Zoom’s update are less severe but still troubling. They include issues that could let attackers crash the app, interfere with its normal functions, or elevate their permissions without proper authorization. Each of these represents a potential entry point for more sophisticated attacks.

So far, none of the companies—Juniper, VMware, or Zoom—have reported any signs that these vulnerabilities have been actively exploited. Still, cybersecurity experts recommend installing these patches without delay. Threat actors often move quickly once details become public, especially for high-severity flaws.

Regular patching remains one of the best defenses in a constantly shifting threat landscape. For enterprise security teams, keeping up with advisories like these is critical. Even older bugs can cause major damage if they remain unpatched for too long.

Share with others