Recent discoveries have unveiled a series of vulnerabilities within Zoom’s software ecosystem, presenting local attackers with potential pathways to compromise systems.
As reliance on virtual meetings increases, cyber attackers actively seek out weaknesses in these communication platforms. Zoom has responded by issuing patches for three newly identified security flaws affecting Zoom Rooms for Windows, the Zoom Workplace VDI Plugin, and Zoom Workplace for iOS.
Should these vulnerabilities remain unaddressed, the most severe could enable authenticated users to elevate their privileges, thereby gaining unauthorized access to compromised devices.
Critical Windows Vulnerabilities
The most significant threats arise from two high-severity vulnerabilities impacting Windows users, both discovered by security researcher sim0nsecurity and reported to Zoom. The first vulnerability, identified as CVE-2026-30906, affects the Zoom Rooms installer for Windows due to an untrusted search path flaw. This flaw permits attackers to insert malicious code in critical file directories.
An authenticated user with local system access can exploit this vulnerability to escalate privileges and gain deeper administrative control over the system. The second critical vulnerability, CVE-2026-30905, is found in the Zoom Workplace VDI Plugin Windows Universal Installer. This flaw involves manipulating how the installer manages file paths during installation, allowing a local attacker to execute unauthorized commands, thereby facilitating another form of privilege escalation.
Risks for iOS Users
While Windows users face the immediate threat of privilege escalation, iOS users confront a different type of vulnerability. Known as CVE-2026-30904, this low-severity flaw affects Zoom Workplace for iOS and was reported by security researcher errorsec_. This vulnerability involves a failure in a protection mechanism.
Unlike the Windows vulnerabilities, exploiting this flaw requires physical access to the iOS device. Once exploited, an attacker could bypass security protections and force the application to reveal sensitive information. Given the need for physical access and high privileges, the CVSS severity score for this issue remains low at 1.8.
Mitigation and Updates
To mitigate these risks and prevent potential system compromises, users and system administrators must act promptly. Zoom has released updates to address these security vulnerabilities across all affected platforms. Organizations should implement rapid patch management policies and ensure all endpoints are fully updated.
Users are advised to secure their devices by downloading and applying the latest software versions directly from Zoom’s official download portal. Staying informed and proactive in applying these updates is crucial for maintaining cybersecurity.
Stay connected with us on Google News, LinkedIn, and X for more immediate updates on cybersecurity and technology news.
