Arab Press

بالشعب و للشعب
Monday, Apr 06, 2026

Zoom Lets Attackers Steal Windows Credentials, Run Programs via UNC Links

Zoom Lets Attackers Steal Windows Credentials, Run Programs via UNC Links

The Zoom Windows client is vulnerable to UNC path injection in the client's chat feature that could allow attackers to steal the Windows credentials of users who click on the link.

The zero-day Zoom flaws could give local, unprivileged attackers root privileges, and allow them to access victims’ microphone and camera.

Two zero-day flaws have been uncovered in Zoom’s macOS client version, according to researchers. The web conferencing platform vulnerabilities could give local, unprivileged attackers root privileges, and allow them to access victims’ microphone and camera.

The two flaws, uncovered by Patrick Wardle, principle security researcher with Jamf, emerge as Zoom comes under increased scrutiny over its security measures, particularly with more employees working from home over the past few weeks due to the coronavirus pandemic.

“Today, we uncovered two (local) security issues affecting Zoom’s macOS application,” said Wardle in a post this week. “Given Zoom’s privacy and security track record this should surprise absolutely zero people.”

The vulnerabilities come with the caveat that an attacker needs a local foothold on systems to exploit them – so bad actors would first need physical access to a victims’ computer. Another attack scenario could include a post-malware infection attack by a remote adversary with a preexisting foothold on the targeted system.

The first flaw stems from an issue with Zoom’s installer and allows unprivileged attackers to gain root privileges. The issue stems from the Zoom installer using the AuthorizationExecuteWithPrivileges application programming interface (API) function, which is used to install the Zoom MacOS app (leveraging preinstallation scripts) without any user interaction.

The API has actually been deprecated by Apple because the it does not attempt to validate a binary being executed at root. Because Zoom is using this API, it means “a local unprivileged attacker or piece of malware may be able to surreptitiously tamper or replace that item in order to escalate their privileges to root,” said Wardle.

To exploit Zoom, the local, non-privileged attacker could simply modify a binary to include the runwithroot script during an install. Because it would then not be validated they would ultimately gain root access.

The second zero day flaw gives attackers Zoom’s mic and camera access, allowing for a way to record Zoom meetings, or snoop in on victims’ personal lives – sans a user access prompt.

Zoom requires access to a system microphone and camera due to its nature of being a web conferencing platform. While recent versions of macOS require explicit user approval for these permissions, Zoom has an “exception” that allows code to be injected by third party libraries. Wardle said a malicious third party library could be loaded into Zoom’s process/address space – automatically inheriting all Zooms access rights, and ultimately giving attackers control over these camera and microphone permissions.

“Due to an ‘exception’ entitlement, we showed how to inject a malicious library into Zoom’s trusted process context,” Wardle said. “This affords malware the ability to record all Zoom meetings, or, simply spawn Zoom in the background to access the mic and webcam at arbitrary times.”

Wardle said, “the former [flaw] is problematic as many enterprises (now) utilize Zoom for (likely) sensitive business meetings, while the latter is problematic as it affords malware the opportunity to surreptitious access either the mic or the webcam, with no macOS alerts and/or prompts.”



Other Security Flaws

Zoom security issues are snowballing. The FBI on Tuesday warned of multiple reports of conferences being disrupted by pornographic or hate images and threatening language, in so-called “Zoom-bombing” attacks. These include a Massachusetts high school online classroom using Zoom, where an unidentified individual dialed in, yelled a profanity and then shouted the teacher’s home address in the middle of instruction, said the FBI’s report.

On Tuesday, security researchers uncovered a Universal Naming Convention (UNC) path injection vulnerability in the Zoom Windows client, which could enable attackers to steal Windows credentials of users. The flaw was first discovered by a Twitter user under the handle _g0dmode, and then verified by security researcher Matthew Hickey, with cybersecurity firm Hacker House.

In chat messages on its platform, Zoom automatically converts UNC paths into clickable links. A UNC path is a PC format for specifying the location of resources on a local-area network (LAN), which can be used to access network resources.

Once a victim in the chat clicks on the linked UNC path, Windows will attempt to connect to the link using an SMB file sharing protocol, according to a report by Bleeping Computer. By default, this transmits the victim’s login name and password. The password is hashed via NTLM, but can easily be sniffed out and cracked by attackers (using free tools like Hashcat).

A separate Zoom issue, reported Wednesday by Motherboard, shows that Zoom is leaking the email addresses and photos of thousands of users. This is due to an issue in Zoom’s “Company Directory,” where the platform automatically adds people to other’s lists of contacts if they use an email address sharing the same domain.

“By default, your Zoom contacts directory contains internal users in the same organization, who are either on the same account or who’s email address uses the same domain as yours (except for publicly used domains including gmail.com, yahoo.com, hotmail.com, etc) in the Company Directory section,” according to Zoom’s support page.
Newsletter

Related Articles

Arab Press
0:00
0:00
Close
Iranian Drone Strike on US Embassy in Saudi Arabia Reportedly Targeted Intelligence Facility
Saudi Deputy Foreign Minister Meets French Embassy Official to Strengthen Bilateral Engagement
Saudi Arabia Calls on United States to Seize Strategic Opportunity to Reshape Middle East
Dating Apps Surge in Saudi Arabia as Social Norms Rapidly Evolve Among Youth
Saudi Arabia Detains Over Fourteen Thousand Illegal Residents in Week-Long Enforcement Drive
Saudi Foreign Minister Engages in Diplomatic Talks with Pakistan, Kuwait and Latvia on Regional Developments
Saudi Arabia Intercepts Cruise Missile as Regional Tensions Intensify
Saudi Stock Market Edges Higher as Tadawul Index Records Modest Gain
Underlying Rivalry Between Saudi Arabia and UAE Persists Despite Temporary Calm
Saudi Arabia’s Non-Oil Sector Contracts in March as Regional Tensions Weigh on Business Activity
Saudi Arabia Unveils Ambition to Establish Prestigious Global Prize Rivaling the Nobel
Saudi Crown Prince to Engage Wall Street in Push for Investment and Economic Expansion
Iran Accuses Saudi Arabia and UAE After Downing of Chinese-Made Drone
Saudi Arabia Condemns Attack on Hospital in Sudan, Calls for Protection of Civilians
Coordinated Drone Strike Targets CIA Facility Within US Embassy in Saudi Arabia
Italy’s Meloni Prioritises Energy Security and Strait of Hormuz Stability During Gulf Tour
Uncertainty Emerges Over Timeline and Direction of Saudi Arabia’s Ambitious Ski Resort Project
UAE and Saudi Arabia Escalate Strategy with Drone Operations Targeting Iran
Trump Delivers Characteristic Remarks on Saudi Crown Prince Amid Intensifying Iran Conflict
Drone Strike on US Embassy in Riyadh Caused Greater Damage Than First Reported
Saudi Arabia Introduces Flexible Solutions for Expired Visas Amid Regional Disruptions
Saudi Arabia’s Online Car Market Accelerates with AI Pricing and Fully Digital Buying Experience
Saudi Arabia Reassesses Defence Strategy as Iranian Drone Threat Drives Shift in Military Partnerships
Drone Strikes Target Saudi Arabia, Kuwait and Bahrain as Regional Conflict Intensifies
Japan and Saudi Arabia Align Efforts to Ease Rising Tensions with Iran
Saudi Crown Prince and Italy’s Meloni Strengthen Strategic Ties in High-Level Talks
SpaceX Explores Potential Five Billion Dollar Investment from Saudi Sovereign Wealth Fund Ahead of IPO
Saudi Arabia Lifts Key Import Barriers to Expand Access for U.S. Beef Exports
Saudi Arabia Enforces Strict Travel Penalties for Visits to Restricted Countries
Italy’s Meloni Embarks on Strategic Gulf Tour to Address Energy Security and Regional Stability
Saudi Film Festival Rescheduled to Summer as Regional Tensions Continue
Saudi Arabia Reports Forty Two Point Six Billion Dollars in Foreign Tourist Spending in 2025
Saudi Crown Prince and Russian President Hold Strategic Call on Escalating Regional Crisis
Saudi Arabia Advances Rail Network as Strategic Alternative to Strait of Hormuz Shipping Route
Ruanyun Edai Launches Saudi Arabia Hub With Forecast of Ten Percent Revenue Growth
Greek Defence Minister Visits Troops in Saudi Arabia Following Successful Missile Interception
Saudi Arabia Expands Global Strategy With Focus on African Critical Minerals
SpaceX Explores Potential Five Billion Dollar Investment From Saudi Fund Ahead of Possible IPO
US Central Command Dismisses Iranian Claim of Mass Casualties Among American Personnel in Saudi Arabia
Co-Diagnostics to Establish Molecular Diagnostics Facility in Saudi Arabia Through Joint Venture
Trump Engages Saudi Crown Prince in Talks on Potential Iran Ceasefire
Saudi Arabia’s Sadara Suspends Operations as Supply Chain Disruptions Intensify
Saudi Arabia Accelerates Energy Shift by Trading Oil Revenues for Battery Investments
Saudi Arabia Introduces Flexible Options for Expired Visas Amid Regional Disruptions
Online Narratives Surge as Iran–US Tensions Spill Into Digital Arena Following Trump Remarks
Saudi Arabia Urges Trump to Seize Strategic Moment as UAE Weighs Ground Deployment
Saudi Arabia Redirects Nearly One Million Barrels of Oil Daily Away from Strait of Hormuz
Saudi Arabia Carries Out Execution of Businessman Linked to 2011 Qatif Unrest
Ukraine–Saudi Defense Pact Signals Rising Demand for Battlefield Expertise
Saudi Arabia Balances Diplomacy and Defense Preparedness Amid Iran Conflict
×