CVE-2026-30900

7.8 HIGH

📋 TL;DR

This vulnerability in Zoom Clients for Windows allows authenticated local users to escalate privileges by exploiting improper minimum version checks during updates. Attackers could gain elevated system access on affected Windows machines. Only Windows Zoom clients with specific vulnerable versions are impacted.

💻 Affected Systems

Products:
  • Zoom Client for Windows
Versions: Specific versions prior to patch (exact range from ZSB-26002)
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated local user access. Zoom Rooms and other Zoom products not affected according to advisory.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local authenticated attacker gains SYSTEM/administrator privileges, enabling complete system compromise, persistence installation, and lateral movement capabilities.

🟠

Likely Case

Malicious insider or compromised user account escalates to admin rights, allowing installation of malware, data theft, or credential harvesting.

🟢

If Mitigated

With proper patch management and least privilege controls, impact limited to isolated workstation compromise without lateral movement.

🌐 Internet-Facing: LOW - Requires local authenticated access, not directly exploitable over network.
🏢 Internal Only: HIGH - Internal users with local access to vulnerable workstations can exploit this for privilege escalation.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local authenticated access. CWE-754 indicates improper check for exceptional conditions during update process.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version specified in ZSB-26002 advisory

Vendor Advisory: https://www.zoom.com/en/trust/security-bulletin/zsb-26002

Restart Required: Yes

Instructions:

1. Open Zoom client. 2. Click profile picture → Check for Updates. 3. Install available update. 4. Restart Zoom client. 5. Verify version matches patched version from advisory.

🔧 Temporary Workarounds

Disable local user installation rights

windows

Restrict standard users from running Zoom installer or update processes with elevated privileges

Use Group Policy: Computer Configuration → Policies → Windows Settings → Security Settings → Local Policies → User Rights Assignment

Implement application whitelisting

windows

Prevent unauthorized Zoom update processes from executing with elevated privileges

Use AppLocker or Windows Defender Application Control to restrict Zoom update executables

🧯 If You Can't Patch

  • Implement strict least privilege: Ensure standard users cannot run processes with administrative rights
  • Monitor for suspicious Zoom update processes running with elevated privileges

🔍 How to Verify

Check if Vulnerable:

Check Zoom client version against vulnerable versions listed in ZSB-26002 advisory

Check Version:

In Zoom client: Click profile picture → About Zoom, or check installed programs in Windows Control Panel

Verify Fix Applied:

Confirm Zoom client version matches or exceeds patched version from advisory

📡 Detection & Monitoring

Log Indicators:

  • Zoom update processes running with SYSTEM or admin privileges
  • Unexpected privilege escalation events in Windows Security logs
  • Zoom installer execution by non-admin users

Network Indicators:

  • Zoom update traffic from non-standard user accounts
  • Unusual outbound connections following local Zoom process execution

SIEM Query:

EventID=4688 AND ProcessName LIKE '%zoom%' AND SubjectUserName!=SYSTEM AND NewProcessName CONTAINS 'install' OR 'update'

🔗 References

📤 Share & Export