London Daily

Focus on the big picture.
Wednesday, Mar 18, 2026

Zoom Lets Attackers Steal Windows Credentials, Run Programs via UNC Links

Zoom Lets Attackers Steal Windows Credentials, Run Programs via UNC Links

The Zoom Windows client is vulnerable to UNC path injection in the client's chat feature that could allow attackers to steal the Windows credentials of users who click on the link.

The zero-day Zoom flaws could give local, unprivileged attackers root privileges, and allow them to access victims’ microphone and camera.

Two zero-day flaws have been uncovered in Zoom’s macOS client version, according to researchers. The web conferencing platform vulnerabilities could give local, unprivileged attackers root privileges, and allow them to access victims’ microphone and camera.

The two flaws, uncovered by Patrick Wardle, principle security researcher with Jamf, emerge as Zoom comes under increased scrutiny over its security measures, particularly with more employees working from home over the past few weeks due to the coronavirus pandemic.

“Today, we uncovered two (local) security issues affecting Zoom’s macOS application,” said Wardle in a post this week. “Given Zoom’s privacy and security track record this should surprise absolutely zero people.”

The vulnerabilities come with the caveat that an attacker needs a local foothold on systems to exploit them – so bad actors would first need physical access to a victims’ computer. Another attack scenario could include a post-malware infection attack by a remote adversary with a preexisting foothold on the targeted system.

The first flaw stems from an issue with Zoom’s installer and allows unprivileged attackers to gain root privileges. The issue stems from the Zoom installer using the AuthorizationExecuteWithPrivileges application programming interface (API) function, which is used to install the Zoom MacOS app (leveraging preinstallation scripts) without any user interaction.

The API has actually been deprecated by Apple because the it does not attempt to validate a binary being executed at root. Because Zoom is using this API, it means “a local unprivileged attacker or piece of malware may be able to surreptitiously tamper or replace that item in order to escalate their privileges to root,” said Wardle.

To exploit Zoom, the local, non-privileged attacker could simply modify a binary to include the runwithroot script during an install. Because it would then not be validated they would ultimately gain root access.

The second zero day flaw gives attackers Zoom’s mic and camera access, allowing for a way to record Zoom meetings, or snoop in on victims’ personal lives – sans a user access prompt.

Zoom requires access to a system microphone and camera due to its nature of being a web conferencing platform. While recent versions of macOS require explicit user approval for these permissions, Zoom has an “exception” that allows code to be injected by third party libraries. Wardle said a malicious third party library could be loaded into Zoom’s process/address space – automatically inheriting all Zooms access rights, and ultimately giving attackers control over these camera and microphone permissions.

“Due to an ‘exception’ entitlement, we showed how to inject a malicious library into Zoom’s trusted process context,” Wardle said. “This affords malware the ability to record all Zoom meetings, or, simply spawn Zoom in the background to access the mic and webcam at arbitrary times.”

Wardle said, “the former [flaw] is problematic as many enterprises (now) utilize Zoom for (likely) sensitive business meetings, while the latter is problematic as it affords malware the opportunity to surreptitious access either the mic or the webcam, with no macOS alerts and/or prompts.”



Other Security Flaws

Zoom security issues are snowballing. The FBI on Tuesday warned of multiple reports of conferences being disrupted by pornographic or hate images and threatening language, in so-called “Zoom-bombing” attacks. These include a Massachusetts high school online classroom using Zoom, where an unidentified individual dialed in, yelled a profanity and then shouted the teacher’s home address in the middle of instruction, said the FBI’s report.

On Tuesday, security researchers uncovered a Universal Naming Convention (UNC) path injection vulnerability in the Zoom Windows client, which could enable attackers to steal Windows credentials of users. The flaw was first discovered by a Twitter user under the handle _g0dmode, and then verified by security researcher Matthew Hickey, with cybersecurity firm Hacker House.

In chat messages on its platform, Zoom automatically converts UNC paths into clickable links. A UNC path is a PC format for specifying the location of resources on a local-area network (LAN), which can be used to access network resources.

Once a victim in the chat clicks on the linked UNC path, Windows will attempt to connect to the link using an SMB file sharing protocol, according to a report by Bleeping Computer. By default, this transmits the victim’s login name and password. The password is hashed via NTLM, but can easily be sniffed out and cracked by attackers (using free tools like Hashcat).

A separate Zoom issue, reported Wednesday by Motherboard, shows that Zoom is leaking the email addresses and photos of thousands of users. This is due to an issue in Zoom’s “Company Directory,” where the platform automatically adds people to other’s lists of contacts if they use an email address sharing the same domain.

“By default, your Zoom contacts directory contains internal users in the same organization, who are either on the same account or who’s email address uses the same domain as yours (except for publicly used domains including gmail.com, yahoo.com, hotmail.com, etc) in the Company Directory section,” according to Zoom’s support page.
Newsletter

Related Articles

0:00
0:00
Close
GB News Faces Regulatory Complaints Over On-Air Remarks on ‘Genocide’ Claims
UK Signals Expanded Support for Gulf Allies as Iranian Attacks Intensify Regional Threats
UK VAT Decision Opens Path for Potential Refunds to U.S. Biopharma Firms
UK and Canada Advance ‘Middle Power’ Strategy to Shape Global Influence Beyond Superpowers
Google Explores AI Opt-Out Features in Search to Address UK Regulatory Concerns
Google Explores AI Opt-Out Features in Search to Address UK Regulatory Concerns
UK Fuel Prices Poised to Surge as Global Tensions Drive Oil Market Volatility
UK Fuel Prices Poised to Surge as Global Tensions Drive Oil Market Volatility
UK Holds Back on Hormuz Escort Mission While Continuing Talks with Allies
TrumpRx Pricing Platform Faces Scrutiny as Some Medicines Remain Costlier Than in the UK
UK, Netherlands and Finland Explore Joint Defence Investment Bank to Boost Military Capability
Deadly Meningitis Outbreak in Kent Raises Alarm as Cases Surge and Emergency Response Expands
UK Security Adviser Viewed US-Iran Nuclear Deal as Within Reach Before Sudden Escalation
UK Prime Minister Urges Continued Focus on Ukraine Amid Escalating Iran Conflict
UK Introduces New Safeguards to Shield Lenders from Bank Run Risks
UK Promotional Products Market Surpasses £1.3 Billion as Demand Strengthens in 2025
Reeves Pushes for Deeper UK-EU Economic Ties to Revive Growth
UK Security Adviser Saw No Imminent Iranian Nuclear Threat Days Before War Erupted
France Signals Warm Welcome for UK Return to EU Single Market Amid Renewed Cooperation Talks
UK Defence Official Criticises Boeing Over Delays to E-7 Wedgetail Programme
UK Urged to Secure Quantum Talent as Minister Warns Against Repeating AI Setbacks
UK Mayors Set to Gain New Spending Powers Under Reeves’ Fiscal Devolution Plan
Western Allies Urge Restraint as Israel Weighs Expanded Ground Operation in Lebanon
Trump Warns NATO Faces ‘Very Bad’ Future Without Stronger Allied Support in Iran Conflict
UK Minister Says Britain Not Bound to Support Every Demand From U.S. President
Starmer Tells Trump Britain Will Not Be Drawn Into Wider Iran War
Starmer Tells Trump Britain Will Not Be Drawn Into Wider Iran War
UK Set to Introduce Steel Tariffs of Up to 50 Percent in New Industrial Strategy
European Governments Decline Trump’s Call to Send Warships to Reopen Strait of Hormuz
Fears Over Iran Conflict Weigh on UK Consumer Confidence
Starmer Says UK Working With Allies on Hormuz Shipping Plan After Trump Raises Pressure
Iran War and Energy Shock Shake Britain’s Economy and Political Debate
Deadly Meningitis Outbreak at UK University Leaves Two Dead and Several Seriously Ill
Deadly Meningitis Outbreak at UK University Leaves Two Dead and Several Seriously Ill
King Charles and Queen Camilla Share Personal Tributes to Their Mothers on UK Mother’s Day
Prince William Honors Princess Diana with Mother’s Day Tribute
UK Economy Stalls in January as Households Cut Back on Eating Out
AI-Generated Singer Becomes Viral Voice for Iranians With New Anthem
London Private Club Founder Plans Exclusive Palm Beach Venue Near Trump’s Mar-a-Lago
Ed Davey Urges Britain to Build Fully Independent Nuclear Missile Capability
What the UK Covid Inquiry Is and How It Investigates Britain’s Pandemic Response
What the UK Covid Inquiry Is and How It Investigates Britain’s Pandemic Response
US Treasury Links British Polo Patrons to Alleged Venezuelan Oil Proceeds Laundering Scheme
Hundreds Gather in London Despite Ban on Annual Pro-Palestinian March
Two Dead and Multiple Students Seriously Ill After Invasive Meningitis Outbreak at UK University
UK Considers Deploying Ships and Mine-Hunting Drones to Reopen Strait of Hormuz
Starmer and Trump Discuss Urgent Need to Reopen Strait of Hormuz Amid Escalating Iran Conflict
Prince Harry and Meghan Markle’s Planned Australia Visit Draws Mixed Reaction From Local Communities
Trump Calls on France and UK to Help Safeguard Strait of Hormuz Shipping Route
Boris Johnson Labels Bitcoin a ‘Ponzi Scheme’, Sparking Debate in Crypto World
×