Beautiful Virgin Islands

Saturday, Mar 14, 2026

Zoom Lets Attackers Steal Windows Credentials, Run Programs via UNC Links

Zoom Lets Attackers Steal Windows Credentials, Run Programs via UNC Links

The Zoom Windows client is vulnerable to UNC path injection in the client's chat feature that could allow attackers to steal the Windows credentials of users who click on the link.

The zero-day Zoom flaws could give local, unprivileged attackers root privileges, and allow them to access victims’ microphone and camera.

Two zero-day flaws have been uncovered in Zoom’s macOS client version, according to researchers. The web conferencing platform vulnerabilities could give local, unprivileged attackers root privileges, and allow them to access victims’ microphone and camera.

The two flaws, uncovered by Patrick Wardle, principle security researcher with Jamf, emerge as Zoom comes under increased scrutiny over its security measures, particularly with more employees working from home over the past few weeks due to the coronavirus pandemic.

“Today, we uncovered two (local) security issues affecting Zoom’s macOS application,” said Wardle in a post this week. “Given Zoom’s privacy and security track record this should surprise absolutely zero people.”

The vulnerabilities come with the caveat that an attacker needs a local foothold on systems to exploit them – so bad actors would first need physical access to a victims’ computer. Another attack scenario could include a post-malware infection attack by a remote adversary with a preexisting foothold on the targeted system.

The first flaw stems from an issue with Zoom’s installer and allows unprivileged attackers to gain root privileges. The issue stems from the Zoom installer using the AuthorizationExecuteWithPrivileges application programming interface (API) function, which is used to install the Zoom MacOS app (leveraging preinstallation scripts) without any user interaction.

The API has actually been deprecated by Apple because the it does not attempt to validate a binary being executed at root. Because Zoom is using this API, it means “a local unprivileged attacker or piece of malware may be able to surreptitiously tamper or replace that item in order to escalate their privileges to root,” said Wardle.

To exploit Zoom, the local, non-privileged attacker could simply modify a binary to include the runwithroot script during an install. Because it would then not be validated they would ultimately gain root access.

The second zero day flaw gives attackers Zoom’s mic and camera access, allowing for a way to record Zoom meetings, or snoop in on victims’ personal lives – sans a user access prompt.

Zoom requires access to a system microphone and camera due to its nature of being a web conferencing platform. While recent versions of macOS require explicit user approval for these permissions, Zoom has an “exception” that allows code to be injected by third party libraries. Wardle said a malicious third party library could be loaded into Zoom’s process/address space – automatically inheriting all Zooms access rights, and ultimately giving attackers control over these camera and microphone permissions.

“Due to an ‘exception’ entitlement, we showed how to inject a malicious library into Zoom’s trusted process context,” Wardle said. “This affords malware the ability to record all Zoom meetings, or, simply spawn Zoom in the background to access the mic and webcam at arbitrary times.”

Wardle said, “the former [flaw] is problematic as many enterprises (now) utilize Zoom for (likely) sensitive business meetings, while the latter is problematic as it affords malware the opportunity to surreptitious access either the mic or the webcam, with no macOS alerts and/or prompts.”



Other Security Flaws

Zoom security issues are snowballing. The FBI on Tuesday warned of multiple reports of conferences being disrupted by pornographic or hate images and threatening language, in so-called “Zoom-bombing” attacks. These include a Massachusetts high school online classroom using Zoom, where an unidentified individual dialed in, yelled a profanity and then shouted the teacher’s home address in the middle of instruction, said the FBI’s report.

On Tuesday, security researchers uncovered a Universal Naming Convention (UNC) path injection vulnerability in the Zoom Windows client, which could enable attackers to steal Windows credentials of users. The flaw was first discovered by a Twitter user under the handle _g0dmode, and then verified by security researcher Matthew Hickey, with cybersecurity firm Hacker House.

In chat messages on its platform, Zoom automatically converts UNC paths into clickable links. A UNC path is a PC format for specifying the location of resources on a local-area network (LAN), which can be used to access network resources.

Once a victim in the chat clicks on the linked UNC path, Windows will attempt to connect to the link using an SMB file sharing protocol, according to a report by Bleeping Computer. By default, this transmits the victim’s login name and password. The password is hashed via NTLM, but can easily be sniffed out and cracked by attackers (using free tools like Hashcat).

A separate Zoom issue, reported Wednesday by Motherboard, shows that Zoom is leaking the email addresses and photos of thousands of users. This is due to an issue in Zoom’s “Company Directory,” where the platform automatically adds people to other’s lists of contacts if they use an email address sharing the same domain.

“By default, your Zoom contacts directory contains internal users in the same organization, who are either on the same account or who’s email address uses the same domain as yours (except for publicly used domains including gmail.com, yahoo.com, hotmail.com, etc) in the Company Directory section,” according to Zoom’s support page.
Newsletter

Related Articles

Beautiful Virgin Islands
0:00
0:00
Close
Weak Growth Signals UK Economy Was Faltering Even Before Middle East Energy Shock
Marks & Spencer Tops UK Fashion Retail Rankings as Most Considered Brand
United States Launches Trade Investigation Into Allies Over Forced Labour Practices
United States Launches Trade Investigation Into Allies Over Forced Labour Practices
Russia Accuses Britain Over Storm Shadow Strike as London Reaffirms Ukraine’s Right to Self-Defence
Russia Accuses Britain Over Storm Shadow Strike as London Reaffirms Ukraine’s Right to Self-Defence
Royal Navy to Acquire Twenty Uncrewed Surface Vessels for Autonomous Warfare Testing
Russia Summons British and French Envoys After Ukrainian Storm Shadow Strike on Strategic Facility
Starmer Confirms Britain Will Maintain Sanctions on Russia Despite U.S. Policy Shift
UK Moves to Refine AI Definition in Investment Security Reform
UK Economy Stalls in January as Growth Unexpectedly Falls to Zero
Asian Energy Security Tested as Strait of Hormuz Disruption Threatens Oil Supplies
Iran Sets Three Conditions for Ending Regional War as Diplomatic Efforts Intensify
Tesla Secures Approval to Supply Electricity Directly to Homes Across Britain
Prince William Delivers Tribute to Australia’s Naval Alliance Amid Renewed Royal Spotlight on the Country
UK Foreign Secretary Travels to Saudi Arabia to Reinforce Support for Regional Allies
Putin’s ‘Hidden Hand’ May Be Assisting Iran in Conflict With Trump, UK Defence Secretary Warns
UK Sets April Deadline for Tech Platforms to Strengthen Online Protections for Children
Elon Musk Moves Into Britain’s Energy Market as Tesla Wins Licence to Supply Power
UK Watchdog Warns Fuel Retailers Against Profiteering Amid Iran War Price Surge
Report Claims Iran Used UK Charity Network to Expand Influence
United States and United Kingdom Establish Joint Standards for Counter-Drone Technology
Iran May Be Laying Naval Mines in Strait of Hormuz, UK Warns Amid Escalating Gulf Tensions
US Deploys Bunker-Buster Bombs to UK Airbase as Iran Conflict Intensifies
British Troops in Iraq Intercept Iranian Drones Targeting Coalition Base
Release of Mandelson Files Raises Tensions as UK Seeks Stable Relations With Donald Trump
UK Documents Reveal Starmer Was Warned About Mandelson’s Epstein Links Before Ambassador Appointment
Nearly Five Hundred UK Mortgage Deals Withdrawn in Two Days as Market Volatility Forces Lenders to Reprice
Three Cargo Ships Hit Near Iran as Attacks Spread to Strategic Strait of Hormuz
Why British Police Repeatedly Declined to Investigate Jeffrey Epstein’s UK Links
UK Parliament Ends Hereditary Seats in House of Lords, Closing Chapter on Centuries of Aristocratic Lawmaking
EU and UK Urge Israel to Act Against Rising West Bank Settler Violence Amid Regional Tensions
US Senator John Kennedy Says Keir Starmer Should Not Be Trusted for Military Advice Amid Iran War Debate
UK High Court Rejects Attempt to Revive Terrorism Charge Against Kneecap Rapper
Revolut Secures Full UK Banking Licence After Multi-Year Regulatory Wait
Kentucky’s Bench Boost Powers Wildcats Past LSU in SEC Tournament Opener
British Couple Die After Being Pulled From Water at Australian Beach During Family Visit
British Airways Suspends UK Repatriation Flights as Middle East Travel Disruption Deepens
US Forces Prepare Ordnance at RAF Fairford as Strategic Bombers Deploy for Middle East Operations
Nigel Farage Faces Criticism After Saying Britain Should Stay Out of Iran War
Landmark UK Trial Begins Over Sony’s PlayStation Store Pricing
UK High Court Rejects Bid to Challenge Britain’s Chagos Islands Agreement With Mauritius
Finnish Duo Triumphs in England’s Annual Wife-Carrying Race, Winning a Barrel of Ale
How U.S. and UK National Security Strategies Are Reshaping the Global Business Landscape
Green Party Gains Momentum as Labour Shifts Toward the Political Centre
Royal Navy Destroyer HMS Dragon Sets Sail for Eastern Mediterranean as Regional Tensions Rise
UK Homebuilder Persimmon Warns Iran Conflict Could Dent Property Buyer Confidence
Roman Abramovich Signals Legal Fight if UK Seeks to Seize Chelsea Sale Funds
UK Ready to Back Emergency Oil Reserve Release as Middle East Conflict Pushes Prices Higher
Study of 40,000 Articles Sparks Debate Over Alleged Anti-Muslim Bias in UK Media
×