CVE-2021-33907

9.8 CRITICAL

📋 TL;DR

This vulnerability allows attackers to execute arbitrary code with elevated privileges by exploiting improper certificate validation during Zoom Client updates on Windows. Attackers could deliver malicious .msi files that appear legitimate, leading to remote code execution. All Windows Zoom Client users before version 5.3.0 are affected.

💻 Affected Systems

Products:
  • Zoom Client for Meetings
Versions: All versions before 5.3.0
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows clients; macOS, Linux, mobile, and web clients are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with SYSTEM-level privileges, allowing installation of persistent malware, data theft, and lateral movement across networks.

🟠

Likely Case

Attackers could install ransomware, spyware, or backdoors on vulnerable systems, potentially affecting entire organizations through update mechanisms.

🟢

If Mitigated

With proper patch management and network segmentation, impact is limited to isolated systems with minimal data exposure.

🌐 Internet-Facing: HIGH - Attackers can exploit this remotely via crafted update requests without authentication.
🏢 Internal Only: HIGH - Internal attackers or compromised systems could exploit this to escalate privileges and move laterally.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires delivering a malicious .msi file, but certificate bypass makes this straightforward for attackers with network access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.3.0 and later

Vendor Advisory: https://explore.zoom.us/en/trust/security/security-bulletin/

Restart Required: Yes

Instructions:

1. Open Zoom Client. 2. Click profile icon → Check for Updates. 3. Install version 5.3.0 or newer. 4. Restart computer if prompted.

🔧 Temporary Workarounds

Disable Automatic Updates

windows

Prevent Zoom from automatically downloading updates that could be malicious.

Not applicable - configure via Zoom settings: File → Settings → General → uncheck 'Automatically keep my Zoom up to date'

Network Segmentation

all

Restrict Zoom update traffic to trusted sources only.

Firewall rules to block Zoom update domains except from trusted update servers

🧯 If You Can't Patch

  • Implement application whitelisting to prevent execution of unauthorized .msi files
  • Use network monitoring to detect unusual update requests or .msi downloads

🔍 How to Verify

Check if Vulnerable:

Open Zoom → Click profile icon → About → Check version number is below 5.3.0

Check Version:

wmic product where name='Zoom' get version

Verify Fix Applied:

Confirm Zoom version is 5.3.0 or higher in About dialog

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs: MSI installer events from Zoom with unusual certificate chains
  • Zoom logs showing update failures or unusual sources

Network Indicators:

  • HTTP/HTTPS requests to non-Zoom domains downloading .msi files
  • Unusual update traffic patterns

SIEM Query:

source='Windows Security' AND event_id=4688 AND process_name='msiexec.exe' AND command_line LIKE '%zoom%'

🔗 References

📤 Share & Export