Arab Press

بالشعب و للشعب
Tuesday, Feb 24, 2026

Zoom Lets Attackers Steal Windows Credentials, Run Programs via UNC Links

Zoom Lets Attackers Steal Windows Credentials, Run Programs via UNC Links

The Zoom Windows client is vulnerable to UNC path injection in the client's chat feature that could allow attackers to steal the Windows credentials of users who click on the link.

The zero-day Zoom flaws could give local, unprivileged attackers root privileges, and allow them to access victims’ microphone and camera.

Two zero-day flaws have been uncovered in Zoom’s macOS client version, according to researchers. The web conferencing platform vulnerabilities could give local, unprivileged attackers root privileges, and allow them to access victims’ microphone and camera.

The two flaws, uncovered by Patrick Wardle, principle security researcher with Jamf, emerge as Zoom comes under increased scrutiny over its security measures, particularly with more employees working from home over the past few weeks due to the coronavirus pandemic.

“Today, we uncovered two (local) security issues affecting Zoom’s macOS application,” said Wardle in a post this week. “Given Zoom’s privacy and security track record this should surprise absolutely zero people.”

The vulnerabilities come with the caveat that an attacker needs a local foothold on systems to exploit them – so bad actors would first need physical access to a victims’ computer. Another attack scenario could include a post-malware infection attack by a remote adversary with a preexisting foothold on the targeted system.

The first flaw stems from an issue with Zoom’s installer and allows unprivileged attackers to gain root privileges. The issue stems from the Zoom installer using the AuthorizationExecuteWithPrivileges application programming interface (API) function, which is used to install the Zoom MacOS app (leveraging preinstallation scripts) without any user interaction.

The API has actually been deprecated by Apple because the it does not attempt to validate a binary being executed at root. Because Zoom is using this API, it means “a local unprivileged attacker or piece of malware may be able to surreptitiously tamper or replace that item in order to escalate their privileges to root,” said Wardle.

To exploit Zoom, the local, non-privileged attacker could simply modify a binary to include the runwithroot script during an install. Because it would then not be validated they would ultimately gain root access.

The second zero day flaw gives attackers Zoom’s mic and camera access, allowing for a way to record Zoom meetings, or snoop in on victims’ personal lives – sans a user access prompt.

Zoom requires access to a system microphone and camera due to its nature of being a web conferencing platform. While recent versions of macOS require explicit user approval for these permissions, Zoom has an “exception” that allows code to be injected by third party libraries. Wardle said a malicious third party library could be loaded into Zoom’s process/address space – automatically inheriting all Zooms access rights, and ultimately giving attackers control over these camera and microphone permissions.

“Due to an ‘exception’ entitlement, we showed how to inject a malicious library into Zoom’s trusted process context,” Wardle said. “This affords malware the ability to record all Zoom meetings, or, simply spawn Zoom in the background to access the mic and webcam at arbitrary times.”

Wardle said, “the former [flaw] is problematic as many enterprises (now) utilize Zoom for (likely) sensitive business meetings, while the latter is problematic as it affords malware the opportunity to surreptitious access either the mic or the webcam, with no macOS alerts and/or prompts.”



Other Security Flaws

Zoom security issues are snowballing. The FBI on Tuesday warned of multiple reports of conferences being disrupted by pornographic or hate images and threatening language, in so-called “Zoom-bombing” attacks. These include a Massachusetts high school online classroom using Zoom, where an unidentified individual dialed in, yelled a profanity and then shouted the teacher’s home address in the middle of instruction, said the FBI’s report.

On Tuesday, security researchers uncovered a Universal Naming Convention (UNC) path injection vulnerability in the Zoom Windows client, which could enable attackers to steal Windows credentials of users. The flaw was first discovered by a Twitter user under the handle _g0dmode, and then verified by security researcher Matthew Hickey, with cybersecurity firm Hacker House.

In chat messages on its platform, Zoom automatically converts UNC paths into clickable links. A UNC path is a PC format for specifying the location of resources on a local-area network (LAN), which can be used to access network resources.

Once a victim in the chat clicks on the linked UNC path, Windows will attempt to connect to the link using an SMB file sharing protocol, according to a report by Bleeping Computer. By default, this transmits the victim’s login name and password. The password is hashed via NTLM, but can easily be sniffed out and cracked by attackers (using free tools like Hashcat).

A separate Zoom issue, reported Wednesday by Motherboard, shows that Zoom is leaking the email addresses and photos of thousands of users. This is due to an issue in Zoom’s “Company Directory,” where the platform automatically adds people to other’s lists of contacts if they use an email address sharing the same domain.

“By default, your Zoom contacts directory contains internal users in the same organization, who are either on the same account or who’s email address uses the same domain as yours (except for publicly used domains including gmail.com, yahoo.com, hotmail.com, etc) in the Company Directory section,” according to Zoom’s support page.
Newsletter

Related Articles

Arab Press
0:00
0:00
Close
GCC Secretary-General Holds Talks with EU Ambassador in Riyadh
Gulf States’ AI Investment Drive Seen as Strategic Bet on Technology and U.S. Security Ties
African Union Commission Chair Meets Saudi Vice Foreign Minister to Deepen Strategic Cooperation
President El-Sisi Holds Strategic Talks with Saudi Crown Prince in Riyadh
Lucid Unveils Up to $12,000 Incentive for Air and Gravity Models in Saudi Arabia
Saudi Arabia Enters Global AI Partnership, Expanding Its Role in International Technology Governance
Saudi Arabia’s Landmark U.S. LNG Agreement Signals Major Strategic Shift
Saudi Arabia Accelerates Global Gaming Push with Billion-Dollar Deals and Expanded PIF Mandate
Saudi Arabia Reports $25.28 Billion Budget Deficit in Fourth Quarter of 2025
Alvarez & Marsal Tax Establishes Dedicated Pillar Two and Transfer Pricing Team in Saudi Arabia
United States Approves Over Fifteen Billion Dollars in Major Arms Sales to Israel and Saudi Arabia
Pre-Iftar Walks Gain Momentum as Ramadan Wellness Trend Spreads
Middle East Jackup Rig Fleet Contracts Further After Saudi Drilling Suspensions
Türkiye and Saudi Arabia Prepare to Sign Five Gigawatt Renewable Energy Deal at COP31
King Mohammed VI Congratulates Saudi Leadership on Founding Day, Reaffirming Strategic Ties
US Envoy Huckabee Clarifies Remarks on Israel After Expansionism Controversy
Saudi Arabia Introduces Limited Exceptions to Regional Headquarters Requirement for Foreign Firms
Saudi Arabia Joins Global Partnership on Artificial Intelligence, Elevating Its Role in Shaping AI Governance
Saudi Arabia and Arab States Mobilise Diplomatically After U.S. Envoy’s Israel Remarks
Cristiano Ronaldo Reaffirms His Commitment to Saudi Arabia Amid Transfer Speculation
Proposed US-Saudi Nuclear Deal Raises Questions Over Uranium Enrichment Provisions
Saudi Arabia Sends 81st Aid Flight to Gaza as Humanitarian Air Bridge Continues
Global Games Show Riyadh 2026 Positioned as Catalyst for Saudi Arabia’s Vision 2030
Saudi Arabia Eases Procurement Rules, Allowing Foreign Firms Greater Access to Government Contracts
Türkiye and Saudi Arabia Seal Two Billion Dollar Solar Energy Agreement
Saudi Crown Prince Reportedly Sends Letter to UAE Leader Over Yemen and Sudan Policies
Saudi Arabia Voices Concerns to UAE Over Sudan Conflict and Yemen Strategy
Saudi Arabia Joins Global Artificial Intelligence Alliance to Strengthen International Collaboration
Shura Island Positioned as Flagship of Saudi Arabia’s Ambitious Red Sea Tourism Drive
Saudi Arabia Rebukes Mike Huckabee Over Remarks in Tucker Carlson Interview
OpenAI CEO Sam Altman praises the rapid progress of Chinese tech companies.
Concerns Mount Over Potential Saudi Uranium Enrichment in Prospective US Nuclear Accord
Trump Directs Government to Release UFO and Alien Information
Trump Signs Global 10% Tariffs on Imports
Investability Emerges as the Defining Test of Saudi Arabia’s Next Market Phase
Saudi Arabia’s Packaging Market Accelerates as Sustainability and E-Commerce Drive Transformation
Saudi Arabia Unveils $32 Billion Push Into Theme Parks and Global Entertainment
Saudi Crude Exports to India Climb Sharply, Closing Gap With Russia
Saudi Arabia’s Halal Cosmetics Market Expands as Faith and Ethical Beauty Drive Growth
ImmunityBio Secures Saudi Partnerships to Launch Flagship Cancer Therapy
United Kingdom Denies U.S. Access to Military Base for Potential Iran Strike
Türkiye and Saudi Arabia Launch Expanded Renewable Energy Partnership
US Supreme Court Voids Trump’s Emergency Tariff Plan, Reshaping Trade Power and Fiscal Risk
Mongolian Mining Family’s HK$247 Million Stanley Home Purchase Highlights Resilient Luxury Market
UK Intensifies Efforts to Secure Saudi Investment in Next-Generation Fighter Jet Programme
Saudi Arabia Tops Middle East Green Building Rankings with Record Growth in 2025
Qatar and Saudi Arabia Each Commit One Billion Dollars to President Trump’s ‘Board of Peace’ Initiative
Ramadan 2026 Prayer Times Set as Fasting Begins in Saudi Arabia and Egypt Announces Dates
Saudi Arabia Launches Ramadan 2026 Hotel Campaign to Boost Religious and Leisure Tourism
Saudi Arabia Seeks Reroute of Greece-Bound Fibre-Optic Cable Through Syria Instead of Israel
×