London Daily

Focus on the big picture.
Sunday, Nov 23, 2025

Zoom Lets Attackers Steal Windows Credentials, Run Programs via UNC Links

Zoom Lets Attackers Steal Windows Credentials, Run Programs via UNC Links

The Zoom Windows client is vulnerable to UNC path injection in the client's chat feature that could allow attackers to steal the Windows credentials of users who click on the link.

The zero-day Zoom flaws could give local, unprivileged attackers root privileges, and allow them to access victims’ microphone and camera.

Two zero-day flaws have been uncovered in Zoom’s macOS client version, according to researchers. The web conferencing platform vulnerabilities could give local, unprivileged attackers root privileges, and allow them to access victims’ microphone and camera.

The two flaws, uncovered by Patrick Wardle, principle security researcher with Jamf, emerge as Zoom comes under increased scrutiny over its security measures, particularly with more employees working from home over the past few weeks due to the coronavirus pandemic.

“Today, we uncovered two (local) security issues affecting Zoom’s macOS application,” said Wardle in a post this week. “Given Zoom’s privacy and security track record this should surprise absolutely zero people.”

The vulnerabilities come with the caveat that an attacker needs a local foothold on systems to exploit them – so bad actors would first need physical access to a victims’ computer. Another attack scenario could include a post-malware infection attack by a remote adversary with a preexisting foothold on the targeted system.

The first flaw stems from an issue with Zoom’s installer and allows unprivileged attackers to gain root privileges. The issue stems from the Zoom installer using the AuthorizationExecuteWithPrivileges application programming interface (API) function, which is used to install the Zoom MacOS app (leveraging preinstallation scripts) without any user interaction.

The API has actually been deprecated by Apple because the it does not attempt to validate a binary being executed at root. Because Zoom is using this API, it means “a local unprivileged attacker or piece of malware may be able to surreptitiously tamper or replace that item in order to escalate their privileges to root,” said Wardle.

To exploit Zoom, the local, non-privileged attacker could simply modify a binary to include the runwithroot script during an install. Because it would then not be validated they would ultimately gain root access.

The second zero day flaw gives attackers Zoom’s mic and camera access, allowing for a way to record Zoom meetings, or snoop in on victims’ personal lives – sans a user access prompt.

Zoom requires access to a system microphone and camera due to its nature of being a web conferencing platform. While recent versions of macOS require explicit user approval for these permissions, Zoom has an “exception” that allows code to be injected by third party libraries. Wardle said a malicious third party library could be loaded into Zoom’s process/address space – automatically inheriting all Zooms access rights, and ultimately giving attackers control over these camera and microphone permissions.

“Due to an ‘exception’ entitlement, we showed how to inject a malicious library into Zoom’s trusted process context,” Wardle said. “This affords malware the ability to record all Zoom meetings, or, simply spawn Zoom in the background to access the mic and webcam at arbitrary times.”

Wardle said, “the former [flaw] is problematic as many enterprises (now) utilize Zoom for (likely) sensitive business meetings, while the latter is problematic as it affords malware the opportunity to surreptitious access either the mic or the webcam, with no macOS alerts and/or prompts.”



Other Security Flaws

Zoom security issues are snowballing. The FBI on Tuesday warned of multiple reports of conferences being disrupted by pornographic or hate images and threatening language, in so-called “Zoom-bombing” attacks. These include a Massachusetts high school online classroom using Zoom, where an unidentified individual dialed in, yelled a profanity and then shouted the teacher’s home address in the middle of instruction, said the FBI’s report.

On Tuesday, security researchers uncovered a Universal Naming Convention (UNC) path injection vulnerability in the Zoom Windows client, which could enable attackers to steal Windows credentials of users. The flaw was first discovered by a Twitter user under the handle _g0dmode, and then verified by security researcher Matthew Hickey, with cybersecurity firm Hacker House.

In chat messages on its platform, Zoom automatically converts UNC paths into clickable links. A UNC path is a PC format for specifying the location of resources on a local-area network (LAN), which can be used to access network resources.

Once a victim in the chat clicks on the linked UNC path, Windows will attempt to connect to the link using an SMB file sharing protocol, according to a report by Bleeping Computer. By default, this transmits the victim’s login name and password. The password is hashed via NTLM, but can easily be sniffed out and cracked by attackers (using free tools like Hashcat).

A separate Zoom issue, reported Wednesday by Motherboard, shows that Zoom is leaking the email addresses and photos of thousands of users. This is due to an issue in Zoom’s “Company Directory,” where the platform automatically adds people to other’s lists of contacts if they use an email address sharing the same domain.

“By default, your Zoom contacts directory contains internal users in the same organization, who are either on the same account or who’s email address uses the same domain as yours (except for publicly used domains including gmail.com, yahoo.com, hotmail.com, etc) in the Company Directory section,” according to Zoom’s support page.
Newsletter

Related Articles

0:00
0:00
Close
China’s Wedding Boom: Nightclubs, Mountains and a Demographic Reset
Fugees Founding Member Pras Michel Sentenced to 14 Years in High-Profile US Foreign Influence Case
WhatsApp’s Unexpected Rise Reshapes American Messaging Habits
United States: Judge Dressed Up as Elvis During Hearings – and Was Forced to Resign
Johnson Blasts ‘Incoherent’ Covid Inquiry Findings Amid Report’s Harsh Critique of His Government
Lord Rothermere Secures £500 Million Deal to Acquire Telegraph Titles
Maduro Tightens Security Measures as U.S. Strike Threat Intensifies
U.S. Envoys Deliver Ultimatum to Ukraine: Sign Peace Deal by Thursday or Risk Losing American Support
Zelenskyy Signals Progress Toward Ending the War: ‘One of the Hardest Moments in History’ (end of his business model?)
U.S. Issues Alert Declaring Venezuelan Airspace a Hazard Due to Escalating Security Conditions
The U.S. State Department Announces That Mass Migration Constitutes an Existential Threat to Western Civilization and Undermines the Stability of Key American Allies
Students Challenge AI-Driven Teaching at University of Staffordshire
Pikeville Medical Center Partners with UK’s Golisano Children’s Network to Expand Pediatric Care
Germany, France and UK Confirm Full Support for Ukraine in US-Backed Security Plan
UK Low-Traffic Neighbourhoods Face Rising Backlash as Pandemic Schemes Unravel
UK Records Coldest Night of Autumn as Sub-Zero Conditions Sweep the Country
UK at Risk of Losing International Doctors as Workforce Exodus Grows, Regulator Warns
ASU Launches ASU London, Extending Its Innovation Brand to the UK Education Market
UK Prime Minister Keir Starmer to Visit China in January as Diplomatic Reset Accelerates
Google Launches Voluntary Buyouts for UK Staff Amid AI-Driven Company Realignment
UK braces for freezing snap as snow and ice warnings escalate
Majority of UK Novelists Fear AI Could Displace Their Work, Cambridge Study Finds
UK's Carrier Strike Group Achieves Full Operational Capability During NATO Drill in Mediterranean
Trump and Mamdani to Meet at the White House: “The Communist Asked”
Nvidia Again Beats Forecasts, Shares Jump in After-Hours Trading
Wintry Conditions Persist Along UK Coasts After Up to Seven Centimetres of Snow
UK Inflation Eases to 3.6 % in October, Opening Door for Rate Cut
UK Accelerates Munitions Factory Build-Out to Reinforce Warfighting Readiness
UK Consumer Optimism Plunges Ahead of November Budget
A Decade of Innovation Stagnation at Apple: The Cook Era Critique
Caribbean Reparations Commission Seeks ‘Mutually Beneficial’ Justice from UK
EU Insists UK Must Contribute Financially for Access to Electricity Market and Broader Ties
UK to Outlaw Live-Event Ticket Resales Above Face Value
President Donald Trump Hosts Saudi Crown Prince Mohammed bin Salman at White House to Seal Major Defence and Investment Deals
German Entertainment Icons Alice and Ellen Kessler Die Together at Age 89
UK Unveils Sweeping Asylum Reforms with 20-Year Settlement Wait and Conditional Status
UK Orders Twitter Hacker to Repay £4.1 Million Following 2020 High-Profile Breach
Popeyes UK Eyes Century Mark as Fried-Chicken Chain Accelerates Roll-out
Two-thirds of UK nurses report working while unwell amid staffing crisis
Britain to Reform Human-Rights Laws in Sweeping Asylum Policy Overhaul
Nearly Half of Job Losses Under Labour Government Affect UK Youth
UK Chancellor Reeves Eyes High-Value Home Levy in Budget to Raise Tens of Billions
UK Urges Poland to Choose Swedish Submarines in Multi-Billion € Defence Bid
US Border Czar Tom Homan Declares UK No Longer a ‘Friend’ Amid Intelligence Rift
UK Announces Reversal of Income Tax Hike Plans Ahead of Budget
Starmer Faces Mounting Turmoil as Leaked Briefings Ignite Leadership Plot Rumours
UK Commentator Sami Hamdi Returns Home After US Visa Revocation and Detention
UK Eyes Denmark-Style Asylum Rules in Major Migration Shift
UK Signals Intelligence Freeze Amid US Maritime Drug-Strike Campaign
TikTok Awards UK & Ireland 2025 Celebrates Top Creators Including Max Klymenko as Creator of the Year
×