CVE-2021-30480
📋 TL;DR
This vulnerability allows remote authenticated attackers within the same Zoom organization or accepted external contacts to execute arbitrary code on Windows and macOS systems running vulnerable Zoom Chat software. The exploit requires no user interaction, enabling potential complete system compromise. Only Zoom Chat (separate from Zoom Meetings chat) is affected.
💻 Affected Systems
- Zoom Chat
📦 What is this software?
Chat by Zoom
⚠️ Risk & Real-World Impact
Worst Case
Complete system takeover with attacker gaining full control of the victim's computer, installing malware, stealing data, and moving laterally within the network.
Likely Case
Targeted attacks against specific individuals within organizations, leading to data theft, surveillance, or ransomware deployment.
If Mitigated
Limited impact due to network segmentation, endpoint protection, and restricted contact lists preventing unauthorized access.
🎯 Exploit Status
Exploit requires authenticated access but no user interaction. Zero-day was discovered and reported through ZDI program with $200,000 bounty.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Versions after April 9, 2021
Vendor Advisory: https://explore.zoom.us/en/trust/security/security-bulletin/
Restart Required: Yes
Instructions:
1. Open Zoom Chat application. 2. Click your profile picture. 3. Select 'Check for Updates'. 4. Install any available updates. 5. Restart Zoom Chat. Alternatively, download latest version from Zoom website.
🔧 Temporary Workarounds
Disable Zoom Chat
windowsUninstall or disable Zoom Chat application if not required for business operations
Control Panel > Programs > Uninstall a program > Select Zoom Chat > Uninstall
Restrict External Contacts
allLimit ability for users to accept external contacts through administrative controls
🧯 If You Can't Patch
- Implement network segmentation to isolate Zoom Chat traffic and limit lateral movement
- Deploy endpoint detection and response (EDR) solutions to detect and block suspicious process execution
🔍 How to Verify
Check if Vulnerable:
Check Zoom Chat version: Open Zoom Chat > Click profile picture > About Zoom Chat. If version date is April 9, 2021 or earlier, system is vulnerable.
Check Version:
On Windows: Check Add/Remove Programs for Zoom Chat version. On macOS: Applications folder > Right-click Zoom Chat > Get Info.
Verify Fix Applied:
Verify Zoom Chat version shows date after April 9, 2021 in About dialog. Check that application updates successfully.
📡 Detection & Monitoring
Log Indicators:
- Unusual process execution from Zoom Chat directory
- Suspicious network connections initiated by Zoom Chat process
Network Indicators:
- Anomalous outbound connections from Zoom Chat to unexpected destinations
- Command and control traffic patterns
SIEM Query:
process_name="Zoom Chat" AND (process_execution_anomaly=TRUE OR network_connection_anomaly=TRUE)
🔗 References
- https://blog.malwarebytes.com/exploits-and-vulnerabilities/2021/04/zoom-zero-day-discovery-makes-calls-safer-hackers-200000-richer/
- https://explore.zoom.us/en/trust/security/security-bulletin/
- https://sector7.computest.nl/post/2021-08-zoom/
- https://twitter.com/thezdi/status/1379855435730149378
- https://twitter.com/thezdi/status/1379859851061395459
- https://www.securityweek.com/200000-awarded-zero-click-zoom-exploit-pwn2own
- https://www.zdnet.com/article/critical-zoom-vulnerability-triggers-remote-code-execution-without-user-input/
- https://www.zerodayinitiative.com/advisories/ZDI-21-971/
- https://zoom.us/feature/messaging
- https://blog.malwarebytes.com/exploits-and-vulnerabilities/2021/04/zoom-zero-day-discovery-makes-calls-safer-hackers-200000-richer/
- https://explore.zoom.us/en/trust/security/security-bulletin/
- https://sector7.computest.nl/post/2021-08-zoom/
- https://twitter.com/thezdi/status/1379855435730149378
- https://twitter.com/thezdi/status/1379859851061395459
- https://www.securityweek.com/200000-awarded-zero-click-zoom-exploit-pwn2own
- https://www.zdnet.com/article/critical-zoom-vulnerability-triggers-remote-code-execution-without-user-input/
- https://www.zerodayinitiative.com/advisories/ZDI-21-971/
- https://zoom.us/feature/messaging