Saudi Press

Saudi Arabia and the world
Thursday, Dec 04, 2025

Zoom Lets Attackers Steal Windows Credentials, Run Programs via UNC Links

Zoom Lets Attackers Steal Windows Credentials, Run Programs via UNC Links

The Zoom Windows client is vulnerable to UNC path injection in the client's chat feature that could allow attackers to steal the Windows credentials of users who click on the link.

The zero-day Zoom flaws could give local, unprivileged attackers root privileges, and allow them to access victims’ microphone and camera.

Two zero-day flaws have been uncovered in Zoom’s macOS client version, according to researchers. The web conferencing platform vulnerabilities could give local, unprivileged attackers root privileges, and allow them to access victims’ microphone and camera.

The two flaws, uncovered by Patrick Wardle, principle security researcher with Jamf, emerge as Zoom comes under increased scrutiny over its security measures, particularly with more employees working from home over the past few weeks due to the coronavirus pandemic.

“Today, we uncovered two (local) security issues affecting Zoom’s macOS application,” said Wardle in a post this week. “Given Zoom’s privacy and security track record this should surprise absolutely zero people.”

The vulnerabilities come with the caveat that an attacker needs a local foothold on systems to exploit them – so bad actors would first need physical access to a victims’ computer. Another attack scenario could include a post-malware infection attack by a remote adversary with a preexisting foothold on the targeted system.

The first flaw stems from an issue with Zoom’s installer and allows unprivileged attackers to gain root privileges. The issue stems from the Zoom installer using the AuthorizationExecuteWithPrivileges application programming interface (API) function, which is used to install the Zoom MacOS app (leveraging preinstallation scripts) without any user interaction.

The API has actually been deprecated by Apple because the it does not attempt to validate a binary being executed at root. Because Zoom is using this API, it means “a local unprivileged attacker or piece of malware may be able to surreptitiously tamper or replace that item in order to escalate their privileges to root,” said Wardle.

To exploit Zoom, the local, non-privileged attacker could simply modify a binary to include the runwithroot script during an install. Because it would then not be validated they would ultimately gain root access.

The second zero day flaw gives attackers Zoom’s mic and camera access, allowing for a way to record Zoom meetings, or snoop in on victims’ personal lives – sans a user access prompt.

Zoom requires access to a system microphone and camera due to its nature of being a web conferencing platform. While recent versions of macOS require explicit user approval for these permissions, Zoom has an “exception” that allows code to be injected by third party libraries. Wardle said a malicious third party library could be loaded into Zoom’s process/address space – automatically inheriting all Zooms access rights, and ultimately giving attackers control over these camera and microphone permissions.

“Due to an ‘exception’ entitlement, we showed how to inject a malicious library into Zoom’s trusted process context,” Wardle said. “This affords malware the ability to record all Zoom meetings, or, simply spawn Zoom in the background to access the mic and webcam at arbitrary times.”

Wardle said, “the former [flaw] is problematic as many enterprises (now) utilize Zoom for (likely) sensitive business meetings, while the latter is problematic as it affords malware the opportunity to surreptitious access either the mic or the webcam, with no macOS alerts and/or prompts.”



Other Security Flaws

Zoom security issues are snowballing. The FBI on Tuesday warned of multiple reports of conferences being disrupted by pornographic or hate images and threatening language, in so-called “Zoom-bombing” attacks. These include a Massachusetts high school online classroom using Zoom, where an unidentified individual dialed in, yelled a profanity and then shouted the teacher’s home address in the middle of instruction, said the FBI’s report.

On Tuesday, security researchers uncovered a Universal Naming Convention (UNC) path injection vulnerability in the Zoom Windows client, which could enable attackers to steal Windows credentials of users. The flaw was first discovered by a Twitter user under the handle _g0dmode, and then verified by security researcher Matthew Hickey, with cybersecurity firm Hacker House.

In chat messages on its platform, Zoom automatically converts UNC paths into clickable links. A UNC path is a PC format for specifying the location of resources on a local-area network (LAN), which can be used to access network resources.

Once a victim in the chat clicks on the linked UNC path, Windows will attempt to connect to the link using an SMB file sharing protocol, according to a report by Bleeping Computer. By default, this transmits the victim’s login name and password. The password is hashed via NTLM, but can easily be sniffed out and cracked by attackers (using free tools like Hashcat).

A separate Zoom issue, reported Wednesday by Motherboard, shows that Zoom is leaking the email addresses and photos of thousands of users. This is due to an issue in Zoom’s “Company Directory,” where the platform automatically adds people to other’s lists of contacts if they use an email address sharing the same domain.

“By default, your Zoom contacts directory contains internal users in the same organization, who are either on the same account or who’s email address uses the same domain as yours (except for publicly used domains including gmail.com, yahoo.com, hotmail.com, etc) in the Company Directory section,” according to Zoom’s support page.
Newsletter

Related Articles

Saudi Press
0:00
0:00
Close
As Trump Deepens Ties with Saudi Arabia, Push for Israel Normalization Takes a Back Seat
Thai Food Village Debuts at Saudi Feast Food Festival 2025 Under Thai Commerce Minister Suphajee’s Lead
Saudi Arabia Sharpens Its Strategic Vision as Economic Transformation Enters New Phase
Saudi Arabia Projects $44 Billion Budget Shortfall in 2026 as Economy Rebalances
OPEC+ Unveils New Capacity-Based System to Anchor Future Oil Output Levels
Will Saudi Arabia End Up Bankrolling Israel’s Post-Ceasefire Order in Lebanon?
Saudi Arabia’s SAMAI Initiative Surpasses One-Million-Citizen Milestone in National AI Upskilling Drive
Saudi Arabia’s Specialty Coffee Market Set to Surge as Demand Soars and New Exhibition Drops in December
Saudi Arabia Moves to Open Two New Alcohol Stores for Foreigners Under Vision 2030 Reform
Saudi Arabia’s AI Ambitions Gain Momentum — but Water, Talent and Infrastructure Pose Major Hurdles
Tensions Surface in Trump-MBS Talks as Saudi Pushes Back on Israel Normalisation
Saudi Arabia Signals Major Maritime Crack-Down on Houthi Routes in Red Sea
Italy and Saudi Arabia Seal Over 20 Strategic Deals at Business Forum in Riyadh
COP30 Ends Without Fossil Fuel Phase-Out as US, Saudi Arabia and Russia Align in Obstruction Role
Saudi-Portuguese Economic Horizons Expand Through Strategic Business Council
DHL Commits $150 Million for Landmark Logistics Hub in Saudi Arabia
Saudi Aramco Weighs Disposals Amid $10 Billion-Plus Asset Sales Discussion
Trump Hosts Saudi Crown Prince for Major Defence and Investment Agreements
Families Accuse OpenAI of Enabling ‘AI-Driven Delusions’ After Multiple Suicides
Riyadh Metro Records Over One Hundred Million Journeys as Saudi Capital Accelerates Transit Era
Trump’s Grand Saudi Welcome Highlights U.S.–Riyadh Pivot as Israel Watches Warily
U.S. Set to Sell F-35 Jets to Saudi Arabia in Major Strategic Shift
Saudi Arabia Doubles Down on U.S. Partnership in Strategic Move
Saudi Arabia Charts Tech and Nuclear Leap Under Crown Prince’s U.S. Visit
Trump Elevates Saudi Arabia to Major Non-NATO Ally Amid Defense Deal
Trump Elevates Saudi Arabia to Major Non-NATO Ally as MBS Visit Yields Deepened Ties
Iran Appeals to Saudi Arabia to Mediate Restart of U.S. Nuclear Talks
Musk, Barra and Ford Join Trump in Lavish White House Dinner for Saudi Crown Prince
Lawmaker Seeks Declassification of ‘Shocking’ 2019 Call Between Trump and Saudi Crown Prince
US and Saudi Arabia Forge Strategic Defence Pact Featuring F-35 Sale and $1 Trillion Investment Pledge
Saudi Sovereign Wealth Fund Emerges as Key Contender in Warner Bros. Discovery Sale
Trump Secures Sweeping U.S.–Saudi Agreements on Jets, Technology and Massive Investment
Detroit CEOs Join White House Dinner as U.S.–Saudi Auto Deal Accelerates
Netanyahu Secures U.S. Assurance That Israel’s Qualitative Military Edge Will Remain Despite Saudi F-35 Deal
Ronaldo Joins Trump and Saudi Crown Prince’s Gala Amid U.S.–Gulf Tech and Investment Surge
U.S.–Saudi Investment Forum Sees U.S. Corporate Titans and Saudi Royalty Forge Billion-Dollar Ties
Elon Musk’s xAI to Deploy 500-Megawatt Saudi Data Centre with State-backed Partner HUMAIN
U.S. Clears Export of Advanced AI Chips to Saudi Arabia and UAE Amid Strategic Tech Partnership
xAI Selects Saudi Data-Centre as First Customer of Nvidia-Backed Humain Project
A Decade of Innovation Stagnation at Apple: The Cook Era Critique
President Trump Hosts Saudi Crown Prince Mohammed bin Salman in Washington Amid Strategic Deal Talks
Saudi Crown Prince to Press Trump for Direct U.S. Role in Ending Sudan War
Trump Hosts Saudi Crown Prince: Five Key Takeaways from the White House Meeting
Trump Firmly Defends Saudi Crown Prince Over Khashoggi Murder Amid Washington Visit
Trump Backs Saudi Crown Prince Over Khashoggi Killing Amid White House Visit
Trump Publicly Defends Saudi Crown Prince Over Khashoggi Killing During Washington Visit
President Donald Trump Hosts Saudi Crown Prince Mohammed bin Salman at White House to Seal Major Defence and Investment Deals
Saudi Arabia’s Solar Surge Signals Unlikely Shift in Global Oil Powerhouse
Saudi Crown Prince Receives Letter from Iranian President Ahead of U.S. Visit
Saudi Arabia’s Crown Prince Begins Washington Visit to Cement Long-Term U.S. Alliance
×