London Daily

Focus on the big picture.
Thursday, Mar 05, 2026

Zoom Lets Attackers Steal Windows Credentials, Run Programs via UNC Links

Zoom Lets Attackers Steal Windows Credentials, Run Programs via UNC Links

The Zoom Windows client is vulnerable to UNC path injection in the client's chat feature that could allow attackers to steal the Windows credentials of users who click on the link.

The zero-day Zoom flaws could give local, unprivileged attackers root privileges, and allow them to access victims’ microphone and camera.

Two zero-day flaws have been uncovered in Zoom’s macOS client version, according to researchers. The web conferencing platform vulnerabilities could give local, unprivileged attackers root privileges, and allow them to access victims’ microphone and camera.

The two flaws, uncovered by Patrick Wardle, principle security researcher with Jamf, emerge as Zoom comes under increased scrutiny over its security measures, particularly with more employees working from home over the past few weeks due to the coronavirus pandemic.

“Today, we uncovered two (local) security issues affecting Zoom’s macOS application,” said Wardle in a post this week. “Given Zoom’s privacy and security track record this should surprise absolutely zero people.”

The vulnerabilities come with the caveat that an attacker needs a local foothold on systems to exploit them – so bad actors would first need physical access to a victims’ computer. Another attack scenario could include a post-malware infection attack by a remote adversary with a preexisting foothold on the targeted system.

The first flaw stems from an issue with Zoom’s installer and allows unprivileged attackers to gain root privileges. The issue stems from the Zoom installer using the AuthorizationExecuteWithPrivileges application programming interface (API) function, which is used to install the Zoom MacOS app (leveraging preinstallation scripts) without any user interaction.

The API has actually been deprecated by Apple because the it does not attempt to validate a binary being executed at root. Because Zoom is using this API, it means “a local unprivileged attacker or piece of malware may be able to surreptitiously tamper or replace that item in order to escalate their privileges to root,” said Wardle.

To exploit Zoom, the local, non-privileged attacker could simply modify a binary to include the runwithroot script during an install. Because it would then not be validated they would ultimately gain root access.

The second zero day flaw gives attackers Zoom’s mic and camera access, allowing for a way to record Zoom meetings, or snoop in on victims’ personal lives – sans a user access prompt.

Zoom requires access to a system microphone and camera due to its nature of being a web conferencing platform. While recent versions of macOS require explicit user approval for these permissions, Zoom has an “exception” that allows code to be injected by third party libraries. Wardle said a malicious third party library could be loaded into Zoom’s process/address space – automatically inheriting all Zooms access rights, and ultimately giving attackers control over these camera and microphone permissions.

“Due to an ‘exception’ entitlement, we showed how to inject a malicious library into Zoom’s trusted process context,” Wardle said. “This affords malware the ability to record all Zoom meetings, or, simply spawn Zoom in the background to access the mic and webcam at arbitrary times.”

Wardle said, “the former [flaw] is problematic as many enterprises (now) utilize Zoom for (likely) sensitive business meetings, while the latter is problematic as it affords malware the opportunity to surreptitious access either the mic or the webcam, with no macOS alerts and/or prompts.”



Other Security Flaws

Zoom security issues are snowballing. The FBI on Tuesday warned of multiple reports of conferences being disrupted by pornographic or hate images and threatening language, in so-called “Zoom-bombing” attacks. These include a Massachusetts high school online classroom using Zoom, where an unidentified individual dialed in, yelled a profanity and then shouted the teacher’s home address in the middle of instruction, said the FBI’s report.

On Tuesday, security researchers uncovered a Universal Naming Convention (UNC) path injection vulnerability in the Zoom Windows client, which could enable attackers to steal Windows credentials of users. The flaw was first discovered by a Twitter user under the handle _g0dmode, and then verified by security researcher Matthew Hickey, with cybersecurity firm Hacker House.

In chat messages on its platform, Zoom automatically converts UNC paths into clickable links. A UNC path is a PC format for specifying the location of resources on a local-area network (LAN), which can be used to access network resources.

Once a victim in the chat clicks on the linked UNC path, Windows will attempt to connect to the link using an SMB file sharing protocol, according to a report by Bleeping Computer. By default, this transmits the victim’s login name and password. The password is hashed via NTLM, but can easily be sniffed out and cracked by attackers (using free tools like Hashcat).

A separate Zoom issue, reported Wednesday by Motherboard, shows that Zoom is leaking the email addresses and photos of thousands of users. This is due to an issue in Zoom’s “Company Directory,” where the platform automatically adds people to other’s lists of contacts if they use an email address sharing the same domain.

“By default, your Zoom contacts directory contains internal users in the same organization, who are either on the same account or who’s email address uses the same domain as yours (except for publicly used domains including gmail.com, yahoo.com, hotmail.com, etc) in the Company Directory section,” according to Zoom’s support page.
Newsletter

Related Articles

0:00
0:00
Close
Iran Conflict Strains U.S.–U.K. Alliance as Trump and Starmer Clash Over Military Strategy
UK Interest Rates Could Rise Above Four Percent Again if Energy Shock Continues, Think Tank Warns
Starmer Defends Britain’s Iran Strategy as Badenoch Urges Stronger Military Support
Labour MP Says She Saw No Sign Husband Broke Law After Arrest in China Espionage Investigation
UK Jobless Rate Overtakes Italy’s for First Time in Years as Labour Market Weakens
United Kingdom Suspends Student Visas for Four Countries in Unprecedented Immigration Move
Campaigners Warn UK Student Visa Ban Could Push Migrants Toward Dangerous Channel Crossings
First U.K. Charter Flight for Stranded Nationals Set to Depart Oman Amid Middle East Crisis
France and United Kingdom Deploy Warships to Eastern Mediterranean as Middle East Conflict Escalates
U.K. Arrests Three Men Including Lawmaker’s Partner in Suspected China Espionage Investigation
Trump Says UK–US ‘Special Relationship’ Is Diminished Amid Middle East Dispute
UK Economic Forecasts Face Fresh Strain from Middle East Conflict and Rising Energy Costs
UK Reaffirms Close US Ties After Trump’s Public Criticism
Reeves Stresses Stability and Fiscal Discipline in UK Budget Update as Growth Outlook Shifts
UK Deploys Royal Navy Destroyer HMS Dragon to Cyprus After Drone Strike on RAF Base
Green Party Surges Past Labour in New UK Poll as Traditional Party Support Crumbles
Majority of Britons Oppose U.S. Use of UK Military Bases in Iran Conflict
UK Intensifies Evacuation Efforts from Oman, Working with Airlines to Boost Flight Capacity
Trump Condemns UK and Spain in Unusually Sharp Rift Over Iran Military Action
Trump Repeats UK Claims That Diverge from Verified Facts Amid Diplomatic Strain
UK Arrests Prominent Figures Linked to Epstein Network as Questions Mount Over US Action
Trump Says UK ‘Took Far Too Long’ to Approve Use of Airbases for Iran Strikes
Scope of Britain’s Role in the Expanding Middle East Conflict Comes Under Scrutiny
Trump Says He Is ‘Very Disappointed’ in Starmer Over Iran Comments
U.S. Embassy in Riyadh Struck by Drones Amid Escalating Iran Conflict
Starmer Confronts Strategic Test After Drone Strike Near British Base in Cyprus
Rolls-Royce Chief Signals Openness to Germany Joining UK-Led Fighter Jet Programme
UK Stocks Slip as Escalating Iran Conflict Triggers Global Market Selloff
UK Overhauls Asylum System to Make Refugee Status Temporary
Starmer Warns of ‘Reckless’ Iranian Strikes Amid Escalating Regional Tensions
British Base in Cyprus Targeted as Drones Intercepted Amid Expanding Iran Conflict
Starmer Diverges from Trump on Iran Strategy, Rejects ‘Regime Change from the Skies’
U.S. and Israel Intensify Strikes on Iran as Conflict Expands to Lebanon and Gulf States
Violent Pro-Iranian Protesters Storm U.S. Consulate in Karachi
Missile Debris Sparks Fires at Dubai’s Jebel Ali Port Near Palm Jumeirah
Iran Strikes U.S. Fifth Fleet Headquarters in Bahrain Amid Wider Gulf Retaliation
When the State Replaces the Parent: How Gender Policy Is Redefining Custody and Coercion
Bill Clinton Denies Knowing Woman in Hot Tub Photo During Closed-Door Epstein Deposition
Former U.S. President Bill Clinton Testifies on Ties to Jeffrey Epstein Before Congressional Oversight Committee
Dyson Reaches Settlement in Landmark UK Forced Labour Case
Barclays and Jefferies Shares Fall After UK Mortgage Lender Collapse Rekindles Credit Market Concerns
Play Exploring Donald Trump’s Rise to Power by ‘Lehman Trilogy’ Author to Premiere in the UK
Man Arrested After Churchill Statue Defaced in Central London
Keir Starmer Faces Political Setback as Labour Finishes Third in High-Profile By-Election
UK Assisted Dying Bill Set to Fall Short in Parliament as Regional Initiatives Gain Ground
UK Defence Ministry Clarifies Position After Reports of Imminent Helicopter Contract
Independent Left-Wing Plumber Secures Shock Victory as Greens Surge in UK By-Election
Reform UK Refers Alleged ‘Family Voting’ Incidents in By-Election to Police
United Kingdom Temporarily Withdraws Embassy Staff from Iran Amid Heightened Regional Tensions
UK Government Reaches Framework Agreement on Release of Mandelson Vetting Files
×