CVE-2024-27240

7.1 HIGH

📋 TL;DR

This vulnerability allows authenticated Windows users with local access to escalate privileges through improper input validation in Zoom Apps installers. Attackers could gain elevated system permissions by exploiting flaws in the installation process. Only Windows users running affected Zoom Apps versions are impacted.

💻 Affected Systems

Products:
  • Zoom Apps for Windows
Versions: Specific versions prior to the patched release (exact versions not specified in provided references)
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated local access to Windows systems with vulnerable Zoom Apps installed. The vulnerability is in the installer component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker gains SYSTEM-level privileges, enabling complete system compromise, installation of persistent malware, credential theft, and lateral movement across the network.

🟠

Likely Case

Local authenticated users (including low-privilege accounts) escalate to administrator privileges, allowing them to bypass security controls, install unauthorized software, or access sensitive data.

🟢

If Mitigated

With proper privilege separation and least privilege principles, impact is limited to the user's own account scope with minimal lateral movement potential.

🌐 Internet-Facing: LOW - This requires local authenticated access and cannot be exploited remotely over the internet.
🏢 Internal Only: HIGH - Internal users with local Windows access can exploit this to gain elevated privileges, posing significant insider threat risks.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local authenticated access but appears straightforward based on the CWE-20 (Improper Input Validation) classification and CVSS score.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Latest version as specified in ZSB-24019 security bulletin

Vendor Advisory: https://www.zoom.com/en/trust/security-bulletin/zsb-24019

Restart Required: Yes

Instructions:

1. Open Zoom desktop client. 2. Click profile picture → Check for Updates. 3. Install available updates. 4. Restart Zoom and affected systems. 5. Verify installation of latest version.

🔧 Temporary Workarounds

Restrict Local Administrative Privileges

windows

Implement least privilege by removing local administrator rights from standard user accounts

Application Control Policies

windows

Use AppLocker or Windows Defender Application Control to restrict execution of Zoom installers

🧯 If You Can't Patch

  • Implement strict least privilege policies to limit local administrative access
  • Monitor for privilege escalation attempts using Windows Event Logs and security tools

🔍 How to Verify

Check if Vulnerable:

Check Zoom version in Zoom client: Click profile picture → About → Version. Compare against patched version in ZSB-24019.

Check Version:

In Zoom client: Click profile picture → About → Version

Verify Fix Applied:

Confirm Zoom version is updated to latest release and verify no privilege escalation attempts in Windows Event Logs (Event ID 4688, 4672).

📡 Detection & Monitoring

Log Indicators:

  • Windows Event ID 4688 (process creation) showing Zoom installer with elevated privileges
  • Event ID 4672 (special privileges assigned) for Zoom-related processes

Network Indicators:

  • No network indicators as this is local privilege escalation

SIEM Query:

EventID=4688 AND (ProcessName="*zoom*" OR CommandLine="*zoom*") AND IntegrityLevel="High" OR EventID=4672 AND SubjectUserName="*zoom*"

🔗 References

📤 Share & Export