London Daily

Focus on the big picture.
Friday, Jan 16, 2026

Zoom Lets Attackers Steal Windows Credentials, Run Programs via UNC Links

Zoom Lets Attackers Steal Windows Credentials, Run Programs via UNC Links

The Zoom Windows client is vulnerable to UNC path injection in the client's chat feature that could allow attackers to steal the Windows credentials of users who click on the link.

The zero-day Zoom flaws could give local, unprivileged attackers root privileges, and allow them to access victims’ microphone and camera.

Two zero-day flaws have been uncovered in Zoom’s macOS client version, according to researchers. The web conferencing platform vulnerabilities could give local, unprivileged attackers root privileges, and allow them to access victims’ microphone and camera.

The two flaws, uncovered by Patrick Wardle, principle security researcher with Jamf, emerge as Zoom comes under increased scrutiny over its security measures, particularly with more employees working from home over the past few weeks due to the coronavirus pandemic.

“Today, we uncovered two (local) security issues affecting Zoom’s macOS application,” said Wardle in a post this week. “Given Zoom’s privacy and security track record this should surprise absolutely zero people.”

The vulnerabilities come with the caveat that an attacker needs a local foothold on systems to exploit them – so bad actors would first need physical access to a victims’ computer. Another attack scenario could include a post-malware infection attack by a remote adversary with a preexisting foothold on the targeted system.

The first flaw stems from an issue with Zoom’s installer and allows unprivileged attackers to gain root privileges. The issue stems from the Zoom installer using the AuthorizationExecuteWithPrivileges application programming interface (API) function, which is used to install the Zoom MacOS app (leveraging preinstallation scripts) without any user interaction.

The API has actually been deprecated by Apple because the it does not attempt to validate a binary being executed at root. Because Zoom is using this API, it means “a local unprivileged attacker or piece of malware may be able to surreptitiously tamper or replace that item in order to escalate their privileges to root,” said Wardle.

To exploit Zoom, the local, non-privileged attacker could simply modify a binary to include the runwithroot script during an install. Because it would then not be validated they would ultimately gain root access.

The second zero day flaw gives attackers Zoom’s mic and camera access, allowing for a way to record Zoom meetings, or snoop in on victims’ personal lives – sans a user access prompt.

Zoom requires access to a system microphone and camera due to its nature of being a web conferencing platform. While recent versions of macOS require explicit user approval for these permissions, Zoom has an “exception” that allows code to be injected by third party libraries. Wardle said a malicious third party library could be loaded into Zoom’s process/address space – automatically inheriting all Zooms access rights, and ultimately giving attackers control over these camera and microphone permissions.

“Due to an ‘exception’ entitlement, we showed how to inject a malicious library into Zoom’s trusted process context,” Wardle said. “This affords malware the ability to record all Zoom meetings, or, simply spawn Zoom in the background to access the mic and webcam at arbitrary times.”

Wardle said, “the former [flaw] is problematic as many enterprises (now) utilize Zoom for (likely) sensitive business meetings, while the latter is problematic as it affords malware the opportunity to surreptitious access either the mic or the webcam, with no macOS alerts and/or prompts.”



Other Security Flaws

Zoom security issues are snowballing. The FBI on Tuesday warned of multiple reports of conferences being disrupted by pornographic or hate images and threatening language, in so-called “Zoom-bombing” attacks. These include a Massachusetts high school online classroom using Zoom, where an unidentified individual dialed in, yelled a profanity and then shouted the teacher’s home address in the middle of instruction, said the FBI’s report.

On Tuesday, security researchers uncovered a Universal Naming Convention (UNC) path injection vulnerability in the Zoom Windows client, which could enable attackers to steal Windows credentials of users. The flaw was first discovered by a Twitter user under the handle _g0dmode, and then verified by security researcher Matthew Hickey, with cybersecurity firm Hacker House.

In chat messages on its platform, Zoom automatically converts UNC paths into clickable links. A UNC path is a PC format for specifying the location of resources on a local-area network (LAN), which can be used to access network resources.

Once a victim in the chat clicks on the linked UNC path, Windows will attempt to connect to the link using an SMB file sharing protocol, according to a report by Bleeping Computer. By default, this transmits the victim’s login name and password. The password is hashed via NTLM, but can easily be sniffed out and cracked by attackers (using free tools like Hashcat).

A separate Zoom issue, reported Wednesday by Motherboard, shows that Zoom is leaking the email addresses and photos of thousands of users. This is due to an issue in Zoom’s “Company Directory,” where the platform automatically adds people to other’s lists of contacts if they use an email address sharing the same domain.

“By default, your Zoom contacts directory contains internal users in the same organization, who are either on the same account or who’s email address uses the same domain as yours (except for publicly used domains including gmail.com, yahoo.com, hotmail.com, etc) in the Company Directory section,” according to Zoom’s support page.
Newsletter

Related Articles

0:00
0:00
Close
The graduate 'jobpocalypse': Entry-level jobs are not shrinking. They are disappearing.
Cybercrime, Inc.: When Crime Becomes an Economy. How the World Accidentally Built a Twenty-Trillion-Dollar Criminal Economy
The Return of the Hands: Why the AI Age Is Rewriting the Meaning of “Real Work”
UK PM Kier Scammer Ridicules Tories With "Kamasutra"
Strategic Restraint, Credible Force, and the Discipline of Power
United Kingdom and Norway Endorse NATO’s ‘Arctic Sentry’ Mission Including Greenland
Woman Claiming to Be Freddie Mercury’s Secret Daughter Dies at Forty-Eight After Rare Cancer Battle
UK Launches First-Ever ‘Town of Culture’ Competition to Celebrate Local Stories and Boost Communities
Planned Sale of Shell and Exxon’s UK Gas Assets to Viaro Energy Collapses Amid Regulatory and Market Hurdles
UK Intensifies Arctic Security Engagement as Trump’s Greenland Rhetoric Fuels Allied Concern
Meghan Markle Could Return to the UK for the First Time in Nearly Four Years If Security Is Secured
Meghan Markle Likely to Return to UK Only if Harry Secures Official Security Cover
UAE Restricts Funding for Emiratis to Study in UK Amid Fears Over Muslim Brotherhood Influence
EU Seeks ‘Farage Clause’ in Brexit Reset Talks to Safeguard Long-Term Agreement Stability
Starmer’s Push to Rally Support for Action Against Elon Musk’s X Faces Setback as Canada Shuns Ban
UK Free School Meals Expansion Faces Political and Budgetary Delays
EU Seeks ‘Farage Clause’ in Brexit Reset Talks With Britain
Germany Hit by Major Airport Strikes Disrupting European Travel
Prince Harry Seeks King Charles’ Support to Open Invictus Games on UK Return
Washington Holds Back as Britain and France Signal Willingness to Deploy Troops in Postwar Ukraine
Elon Musk Accuses UK Government of Suppressing Free Speech as X Faces Potential Ban Over AI-Generated Content
Russia Deploys Hypersonic Missile in Strike on Ukraine
OpenAI and SoftBank Commit One Billion Dollars to Energy and Data Centre Supplier
UK Prime Minister Starmer Reaffirms Support for Danish Sovereignty Over Greenland Amid U.S. Pressure
UK Support Bolsters U.S. Seizure of Russian-Flagged Tanker Marinera in Atlantic Strike on Sanctions Evasion
The Claim That Maduro’s Capture and Trial Violate International Law Is Either Legally Illiterate—or Deliberately Deceptive
UK Data Watchdog Probes Elon Musk’s X Over AI-Generated Grok Images Amid Surge in Non-Consensual Outputs
Prince Harry to Return to UK for Court Hearing Without Plans to Meet King Charles III
UK Confirms Support for US Seizure of Russian-Flagged Oil Tanker in North Atlantic
Béla Tarr, Visionary Hungarian Filmmaker, Dies at Seventy After Long Illness
UK and France Pledge Military Hubs Across Ukraine in Post-Ceasefire Security Plan
Prince Harry Poised to Regain UK Security Cover, Clearing Way for Family Visits
UK Junk Food Advertising Ban Faces Major Loophole Allowing Brand-Only Promotions
Maduro’s Arrest Without The Hague Tests International Law—and Trump’s Willingness to Break It
German Intelligence Secretly Intercepted Obama’s Air Force One Communications
The U.S. State Department’s account in Persian: “President Trump is a man of action. If you didn’t know it until now, now you do—do not play games with President Trump.”
Fake Mainstream Media Double Standard: Elon Musk Versus Mamdani
HSBC Leads 2026 Mortgage Rate Cuts as UK Lending Costs Ease
US Joint Chiefs Chairman Outlines How Operation Absolute Resolve Was Carried Out in Venezuela
Starmer Welcomes End of Maduro Era While Stressing International Law and UK Non-Involvement
Korean Beauty Turns Viral Skincare Into a Global Export Engine
UK Confirms Non-Involvement in U.S. Military Action Against Venezuela
UK Terror Watchdog Calls for Australian-Style Social Media Ban to Protect Teenagers
Iranian Protests Intensify as Another Revolutionary Guard Member Is Killed and Khamenei Blames the West
Delta Force Identified as Unit Behind U.S. Operation That Captured Venezuela’s President
Europe’s Luxury Sanctions Punish Russian Consumers While a Sanctions-Circumvention Industry Thrives
Berkshire’s Buffett-to-Abel Transition Tests Whether a One-Man Trust Model Can Survive as a System
Fraud in European Central Bank: Lagarde’s Hidden Pay Premium Exposes a Transparency Crisis at the European Central Bank
Trump Announces U.S. Large-Scale Strike on Venezuela, Declares President Maduro and Wife Captured
Tesla Loses EV Crown to China’s BYD After Annual Deliveries Decline in 2025
×