Arab Press

بالشعب و للشعب
Sunday, Apr 26, 2026

Zoom Lets Attackers Steal Windows Credentials, Run Programs via UNC Links

Zoom Lets Attackers Steal Windows Credentials, Run Programs via UNC Links

The Zoom Windows client is vulnerable to UNC path injection in the client's chat feature that could allow attackers to steal the Windows credentials of users who click on the link.

The zero-day Zoom flaws could give local, unprivileged attackers root privileges, and allow them to access victims’ microphone and camera.

Two zero-day flaws have been uncovered in Zoom’s macOS client version, according to researchers. The web conferencing platform vulnerabilities could give local, unprivileged attackers root privileges, and allow them to access victims’ microphone and camera.

The two flaws, uncovered by Patrick Wardle, principle security researcher with Jamf, emerge as Zoom comes under increased scrutiny over its security measures, particularly with more employees working from home over the past few weeks due to the coronavirus pandemic.

“Today, we uncovered two (local) security issues affecting Zoom’s macOS application,” said Wardle in a post this week. “Given Zoom’s privacy and security track record this should surprise absolutely zero people.”

The vulnerabilities come with the caveat that an attacker needs a local foothold on systems to exploit them – so bad actors would first need physical access to a victims’ computer. Another attack scenario could include a post-malware infection attack by a remote adversary with a preexisting foothold on the targeted system.

The first flaw stems from an issue with Zoom’s installer and allows unprivileged attackers to gain root privileges. The issue stems from the Zoom installer using the AuthorizationExecuteWithPrivileges application programming interface (API) function, which is used to install the Zoom MacOS app (leveraging preinstallation scripts) without any user interaction.

The API has actually been deprecated by Apple because the it does not attempt to validate a binary being executed at root. Because Zoom is using this API, it means “a local unprivileged attacker or piece of malware may be able to surreptitiously tamper or replace that item in order to escalate their privileges to root,” said Wardle.

To exploit Zoom, the local, non-privileged attacker could simply modify a binary to include the runwithroot script during an install. Because it would then not be validated they would ultimately gain root access.

The second zero day flaw gives attackers Zoom’s mic and camera access, allowing for a way to record Zoom meetings, or snoop in on victims’ personal lives – sans a user access prompt.

Zoom requires access to a system microphone and camera due to its nature of being a web conferencing platform. While recent versions of macOS require explicit user approval for these permissions, Zoom has an “exception” that allows code to be injected by third party libraries. Wardle said a malicious third party library could be loaded into Zoom’s process/address space – automatically inheriting all Zooms access rights, and ultimately giving attackers control over these camera and microphone permissions.

“Due to an ‘exception’ entitlement, we showed how to inject a malicious library into Zoom’s trusted process context,” Wardle said. “This affords malware the ability to record all Zoom meetings, or, simply spawn Zoom in the background to access the mic and webcam at arbitrary times.”

Wardle said, “the former [flaw] is problematic as many enterprises (now) utilize Zoom for (likely) sensitive business meetings, while the latter is problematic as it affords malware the opportunity to surreptitious access either the mic or the webcam, with no macOS alerts and/or prompts.”



Other Security Flaws

Zoom security issues are snowballing. The FBI on Tuesday warned of multiple reports of conferences being disrupted by pornographic or hate images and threatening language, in so-called “Zoom-bombing” attacks. These include a Massachusetts high school online classroom using Zoom, where an unidentified individual dialed in, yelled a profanity and then shouted the teacher’s home address in the middle of instruction, said the FBI’s report.

On Tuesday, security researchers uncovered a Universal Naming Convention (UNC) path injection vulnerability in the Zoom Windows client, which could enable attackers to steal Windows credentials of users. The flaw was first discovered by a Twitter user under the handle _g0dmode, and then verified by security researcher Matthew Hickey, with cybersecurity firm Hacker House.

In chat messages on its platform, Zoom automatically converts UNC paths into clickable links. A UNC path is a PC format for specifying the location of resources on a local-area network (LAN), which can be used to access network resources.

Once a victim in the chat clicks on the linked UNC path, Windows will attempt to connect to the link using an SMB file sharing protocol, according to a report by Bleeping Computer. By default, this transmits the victim’s login name and password. The password is hashed via NTLM, but can easily be sniffed out and cracked by attackers (using free tools like Hashcat).

A separate Zoom issue, reported Wednesday by Motherboard, shows that Zoom is leaking the email addresses and photos of thousands of users. This is due to an issue in Zoom’s “Company Directory,” where the platform automatically adds people to other’s lists of contacts if they use an email address sharing the same domain.

“By default, your Zoom contacts directory contains internal users in the same organization, who are either on the same account or who’s email address uses the same domain as yours (except for publicly used domains including gmail.com, yahoo.com, hotmail.com, etc) in the Company Directory section,” according to Zoom’s support page.
Newsletter

Related Articles

Arab Press
0:00
0:00
Close
News Roundup
Strategic Saudi-Bahrain Causeway Closed Amid Security Concerns as Trump Deadline Approaches
Saudi Arabia Keeps Red Sea Oil Exports Flowing Despite Regional Tensions
Pipeline Attack Cuts Significant Share of Saudi Arabia’s Oil Export Capacity
Saudi Business Leader Abudawood Appointed Chairman of Merit Incentives Group
TotalEnergies Confirms Damage at Saudi Refinery Following Security Incident
Saudi Arabia Launches Early Construction Phase for King Salman Stadium Project
Saudi Shift Away from Longstanding Dollar Oil Framework Gains Attention Amid Iran Conflict
Türkiye and Saudi Arabia Resolve Long-Running Transit Visa Dispute
Saudi Oil Capacity and Pipeline Flows Reduced as Supply Risks Intensify
TotalEnergies Reports Damage to Saudi SATORP Refinery Following Security Incidents
Gulf States Assess Prospects of U.S.-Iran Truce as Regional Stability Efforts Intensify
South Korea Resumes Honey Exports to Saudi Arabia Following Sanitary Approval
Saudi Arabia Carries Out Sentences in Eastern Province Following Security Convictions
Saudi Sovereign Wealth Fund Backs King Street’s Regional Credit Strategy
Saudi Arabia Secures World Cup Return as Egypt Celebrates Landmark Qualification
Iran and Saudi Arabia Intensify Diplomatic Engagement Amid Regional Tensions
Russia and Saudi Arabia Open Visa-Free Travel Corridor for Citizens
Saudi Oil Output Capacity Reduced by 600,000 Barrels Per Day Amid Regional Conflict
Saudi Arabia Suspends Operations at Select Energy Sites as Precautionary Measure
Saudi Arabia Halts Operations at Multiple Energy Facilities Amid Heightened Tensions
Global Markets Jolt as Iran Signals Ceasefire Breakdown and Rising Regional Tensions
King Street Aligns with Saudi Sovereign Wealth Fund to Expand Alternative Investments in Middle East
Attack on Saudi Arabia’s Jubail Petrochemical Hub Raises Global Supply Concerns
Debate Emerges Over Saudi Strategic Decisions as Gulf Cooperation Council Dynamics Come Into Focus
Saudi Arabia Expands Full Workforce Localisation to 69 Professions in Major Labour Reform
Emerging Alliance of Pakistan, Turkey, Egypt and Saudi Arabia Signals New Regional Power Dynamic Amid Iran Conflict
Iran Linked to Strikes Across Gulf States Following Refinery Attack Escalation
Saudi Arabia Voices Concern Over Fragile US–Iran Ceasefire Stability
Starmer Warns Sustained Effort Needed to Ensure US–Iran Ceasefire Holds
Saudi Arabia’s Key East-West Oil Pipeline Targeted Following Ceasefire Announcement
Iran Targets Saudi Arabia’s East-West Oil Pipeline in Escalating Regional Tensions
Trump Warns of Civilizational Stakes as Iran Halts Negotiations
Saudi Companies Expand Remote Work Measures Ahead of Iran-Related Security Concerns
Iran Warns of Strikes on Saudi Energy Infrastructure if US Targets Its Facilities
Iran Urges Civilians to Form Human Shields Around Nuclear Sites as Diplomatic Deadline Approaches
Saudi Arabia Raises Oil Prices to Record Premiums Amid Supply Pressures Linked to Iran Conflict
Key Saudi-Bahrain Causeway Closed Amid Heightened Security Concerns Linked to Iran
Formula One Calendar Gap Explained as Fans Await Next Grand Prix
Growing Strain on the Petrodollar System Comes Into Focus Amid Iran Conflict
Reported Strike on Saudi Arabia’s Jubail Complex Raises Global Energy Supply Concerns
FedEx Introduces New Digital Tool to Streamline Imports into Saudi Arabia
Iran Claims Strike on Saudi Arabia’s Jubail Petrochemical Complex Amid Rising Regional Tensions
Taiwan to Source Oil Shipments from Saudi Arabia’s Red Sea Ports
Saudi Arabia Evacuates Riyadh Financial District as Precaution Amid Regional Tensions
Saudi Arabia Balances Ambitious Economic Vision Amid Regional Tensions and Financial Pressures
Budget Saudi Arabia Reports Strong Full-Year 2025 Financial Performance
Saudi Arabia Expands Investment in Capcom With Stake Reaching Six Percent
Saudi Arabia Assesses Significant Economic Impact From Regional Conflict Involving Iran
US Beef Secures Expanded Market Access in Saudi Arabia
×