Critical (9.6)

Windows Vulnerability (CVE-2026-30903)

CVE-2026-30903

External Control of File Name or Path in the Mail feature of Zoom Workplace for Windows before 6.6.0 may allow an unauthenticated user to conduct an escalation of privilege via network access....

Affected: Windows Zoom

Overview

A critical security vulnerability, tracked as CVE-2026-30903, has been identified in the Mail feature of Zoom Workplace for Windows. This flaw is an instance of “External Control of File Name or Path,” which could allow an unauthenticated attacker on the same network to escalate their privileges on a vulnerable system. The vulnerability affects versions of Zoom Workplace for Windows prior to version 6.6.0.

Vulnerability Explanation

In simple terms, this vulnerability exists because the software does not properly validate or restrict the file paths used by its Mail feature. An attacker could send specially crafted network requests that trick the application into writing or executing files in unintended, sensitive locations on the Windows operating system. Since the attack can be launched by an unauthenticated user with network access, it significantly lowers the barrier for exploitation.

Potential Impact

The impact of this flaw is severe. Successful exploitation could allow an attacker to gain elevated privileges on a compromised workstation. With these higher privileges, an attacker could install programs; view, change, or delete data; or create new accounts with full user rights. In a corporate environment, this could lead to a full compromise of the affected machine, lateral movement across the network, and data theft. For the latest on how such vulnerabilities are exploited in real-world incidents, you can review recent data breach reports.

Remediation and Mitigation

The primary and most critical action is to update the software immediately.

Immediate Action:

  • Update Zoom Workplace: All users must upgrade to Zoom Workplace for Windows version 6.6.0 or later. This version contains the necessary patch. Updates are typically available through the Zoom client itself (Check for Updates) or can be downloaded directly from the official Zoom website.

Additional Security Measures:

  • Network Segmentation: Implement network segmentation to limit unnecessary lateral network traffic, which can help contain the spread of such network-based attacks.
  • Principle of Least Privilege: Ensure users operate with standard user privileges rather than administrative rights. This can limit the potential damage of a successful privilege escalation attack.
  • Stay Informed: Regularly updating all software is a cornerstone of cybersecurity hygiene. For ongoing updates on critical vulnerabilities like this, follow our security news section.

By applying the update promptly, organizations can effectively eliminate this critical threat to their systems.

Share:

Never miss a critical vulnerability

Get real-time security alerts delivered to your preferred platform.

Related Advisories

Other Windows Vulnerabilities

View all Windows vulnerabilities →

Never Miss a Critical Alert

CVE advisories, breach reports, and threat intel — delivered daily to your inbox.