Beautiful Virgin Islands

Friday, Apr 03, 2026

Zoom Lets Attackers Steal Windows Credentials, Run Programs via UNC Links

Zoom Lets Attackers Steal Windows Credentials, Run Programs via UNC Links

The Zoom Windows client is vulnerable to UNC path injection in the client's chat feature that could allow attackers to steal the Windows credentials of users who click on the link.

The zero-day Zoom flaws could give local, unprivileged attackers root privileges, and allow them to access victims’ microphone and camera.

Two zero-day flaws have been uncovered in Zoom’s macOS client version, according to researchers. The web conferencing platform vulnerabilities could give local, unprivileged attackers root privileges, and allow them to access victims’ microphone and camera.

The two flaws, uncovered by Patrick Wardle, principle security researcher with Jamf, emerge as Zoom comes under increased scrutiny over its security measures, particularly with more employees working from home over the past few weeks due to the coronavirus pandemic.

“Today, we uncovered two (local) security issues affecting Zoom’s macOS application,” said Wardle in a post this week. “Given Zoom’s privacy and security track record this should surprise absolutely zero people.”

The vulnerabilities come with the caveat that an attacker needs a local foothold on systems to exploit them – so bad actors would first need physical access to a victims’ computer. Another attack scenario could include a post-malware infection attack by a remote adversary with a preexisting foothold on the targeted system.

The first flaw stems from an issue with Zoom’s installer and allows unprivileged attackers to gain root privileges. The issue stems from the Zoom installer using the AuthorizationExecuteWithPrivileges application programming interface (API) function, which is used to install the Zoom MacOS app (leveraging preinstallation scripts) without any user interaction.

The API has actually been deprecated by Apple because the it does not attempt to validate a binary being executed at root. Because Zoom is using this API, it means “a local unprivileged attacker or piece of malware may be able to surreptitiously tamper or replace that item in order to escalate their privileges to root,” said Wardle.

To exploit Zoom, the local, non-privileged attacker could simply modify a binary to include the runwithroot script during an install. Because it would then not be validated they would ultimately gain root access.

The second zero day flaw gives attackers Zoom’s mic and camera access, allowing for a way to record Zoom meetings, or snoop in on victims’ personal lives – sans a user access prompt.

Zoom requires access to a system microphone and camera due to its nature of being a web conferencing platform. While recent versions of macOS require explicit user approval for these permissions, Zoom has an “exception” that allows code to be injected by third party libraries. Wardle said a malicious third party library could be loaded into Zoom’s process/address space – automatically inheriting all Zooms access rights, and ultimately giving attackers control over these camera and microphone permissions.

“Due to an ‘exception’ entitlement, we showed how to inject a malicious library into Zoom’s trusted process context,” Wardle said. “This affords malware the ability to record all Zoom meetings, or, simply spawn Zoom in the background to access the mic and webcam at arbitrary times.”

Wardle said, “the former [flaw] is problematic as many enterprises (now) utilize Zoom for (likely) sensitive business meetings, while the latter is problematic as it affords malware the opportunity to surreptitious access either the mic or the webcam, with no macOS alerts and/or prompts.”



Other Security Flaws

Zoom security issues are snowballing. The FBI on Tuesday warned of multiple reports of conferences being disrupted by pornographic or hate images and threatening language, in so-called “Zoom-bombing” attacks. These include a Massachusetts high school online classroom using Zoom, where an unidentified individual dialed in, yelled a profanity and then shouted the teacher’s home address in the middle of instruction, said the FBI’s report.

On Tuesday, security researchers uncovered a Universal Naming Convention (UNC) path injection vulnerability in the Zoom Windows client, which could enable attackers to steal Windows credentials of users. The flaw was first discovered by a Twitter user under the handle _g0dmode, and then verified by security researcher Matthew Hickey, with cybersecurity firm Hacker House.

In chat messages on its platform, Zoom automatically converts UNC paths into clickable links. A UNC path is a PC format for specifying the location of resources on a local-area network (LAN), which can be used to access network resources.

Once a victim in the chat clicks on the linked UNC path, Windows will attempt to connect to the link using an SMB file sharing protocol, according to a report by Bleeping Computer. By default, this transmits the victim’s login name and password. The password is hashed via NTLM, but can easily be sniffed out and cracked by attackers (using free tools like Hashcat).

A separate Zoom issue, reported Wednesday by Motherboard, shows that Zoom is leaking the email addresses and photos of thousands of users. This is due to an issue in Zoom’s “Company Directory,” where the platform automatically adds people to other’s lists of contacts if they use an email address sharing the same domain.

“By default, your Zoom contacts directory contains internal users in the same organization, who are either on the same account or who’s email address uses the same domain as yours (except for publicly used domains including gmail.com, yahoo.com, hotmail.com, etc) in the Company Directory section,” according to Zoom’s support page.
Newsletter

Related Articles

Beautiful Virgin Islands
0:00
0:00
Close
Trump’s Strategic Pressure on UK Seen as Push for Stronger Alignment and Fairer Terms
UK Focuses on Trade Finance to Secure Critical Materials for Defence and Energy Sectors
Majority of UK Businesses Hit by Middle East Conflict While Confidence Holds Firm
UK Royal Navy Faces Renewed Scrutiny as Debate Intensifies Over Capability and Readiness
Reform UK Faces Mounting Distractions as Policy Agenda Struggles to Gain Traction
Investigation Launched Into Northern Cyprus IVF Clinics After UK Families Receive Incorrect Sperm
International Meeting Issues Unified Call to Safeguard Navigation Through Strait of Hormuz
Potential Strait of Hormuz Closure Raises Concerns Over UK Food and Medicine Supply Chains
UK Leads Coalition of Over Forty Nations Urging Iran to Reopen Strait of Hormuz
UK Secures Tariff-Free Access for Medicines in Landmark US Pharma Trade Agreement
King Charles III Invited to Address Joint Session of U.S. Congress in Rare Diplomatic Honor
Debate Grows Over Whether Expanded North Sea Drilling Can Reduce UK Energy Bills
UK Faces Heightened Risk of Jet Fuel Shortages, Airline Chief Warns
UK Ends Police Investigations into Lawful Social Media Posts After Review Finds Overreach
Abramovich Moves to Establish Charity for Frozen Chelsea Sale Proceeds Amid UK Dispute
Starmer Reaffirms NATO Commitment While Responding to Trump’s Strategic Critique
UK Aid Reductions Raise Fears of Severe Human Impact Across Parts of Africa
UK Signals Renewed Push for EU Cooperation as Iran Conflict Reshapes Security Landscape
Bank of England Signals Caution as Bailey Advises Markets Against Expecting Rate Hikes
UK to Convene Global Coalition to Restore Shipping Through Strait of Hormuz
Trump Signals Possible NATO Reassessment, Emphasizes Stronger U.S. Strategic Autonomy
Australia Joins British-Led Efforts to Reopen Strait of Hormuz Amid Escalating Tensions
King Charles Plans US State Visit as UK Strengthens Ties with Trump Leadership
UK Regulator Launches Investigation Into Microsoft’s Business Software Practices
Kanye West Set for High-Profile Return to UK Stage at Wireless Festival
Trump Presses Europe to Strengthen Commitment as Iran Conflict Escalates
UK to Deploy Additional Troops to Middle East Amid Rising Regional Tensions
UK Authorities Face Claims of Heavy-Handed Measures in Monitoring Released Pro-Palestine Activists
Trump Calls on UK to Secure Its Own Energy as Iran Conflict Intensifies
Nigel Farage Declines Invitation to UK Conservative Conference Led by Liz Truss
Trump Warns Allies to Take Responsibility as Rift Deepens with UK and France Over Iran Conflict
How Britain’s Prime Minister Controls U.S. Bomber Access in Escalating Iran Conflict
Trump Urges Allies to Secure Their Own Oil Supplies as Hormuz Crisis Disrupts Global Energy
Russia Expels British Diplomat as UK Pushes Back Against Pressure
White House App Faces Scrutiny After Claims of Continuous User Location Tracking
BBC Faces Scrutiny Over Allegations of Paid Content Linked to Saudi Arabia
UK-France Coastal Patrol Agreement Nears Breakdown Amid Migration Pressures
UK Police Detain Pro-Palestine Activist Again Weeks After Bail Release
FTSE 100 Advances as Energy and Mining Shares Gain Amid Middle East Tensions
Eli Lilly Seeks UK Pricing Deal to Unlock Renewed Pharmaceutical Investment
Three Arrested in UK After Massive Cocaine Haul Discovered Hidden in Banana Shipment
UK Fuel Prices Poised for Further Surge Amid Global Energy Pressures
Apple Subsidiary Penalized by UK Authorities for Breach of Moscow Sanctions
Western Allies Intensify Coordinated Sanctions Strategy Against Russia
UK Lawmakers Face Criticism Over Renewed Push for Social Media Restrictions
Starmer Signals UK Crackdown on Addictive Social Media Features
Rising Costs Push One in Five UK Hospitality Businesses to the Brink of Closure
Man Arrested on Suspicion of Attempted Murder After Car Strikes Pedestrians in UK, Injuring Seven
Escalating Conflict Involving Iran Tightens Fiscal Pressures and Highlights UK Economic Vulnerabilities
UK Moves to Confront Russian ‘Shadow Fleet’ Operating in Its Waters
×