The flaws, ranging from High to Critical severity, could allow attackers to escalate privileges on affected systems, with one critical flaw exploitable by unauthenticated remote attackers with no prior system access.
The most severe vulnerability, tracked as CVE-2026-30903 (ZSB-26005), is classified as Critical and targets the Mail feature within Zoom Workplace for Windows.
The flaw stems from External Control of File Name or Path, a weakness that lets an attacker manipulate file references to execute unauthorized operations. An unauthenticated user could exploit this vulnerability via network access to escalate privileges on affected systems.
The CVSS vector confirms that the attack requires no authentication and can be launched remotely, making it the most dangerous of the four disclosures. All Zoom Workplace for Windows installations running versions prior to 6.6.0 are affected.
Three additional High-severity vulnerabilities round out the disclosure batch. CVE-2026-30902 (ZSB-26004) affects Zoom Clients for Windows and involves Improper Privilege Management, where incorrectly assigned user privileges could be abused to gain unauthorized elevated access.
CVE-2026-30901 (ZSB-26003) targets Zoom Rooms for Windows and involves Improper Input Validation, a class of vulnerability that allows malformed or unexpected inputs to trigger unintended behaviors, potentially including code execution or privilege changes.
CVE-2026-30900 (ZSB-26002) affects Zoom Workplace Clients for Windows and is described as an Improper Check flaw, suggesting a failure in verification logic that could be leveraged to bypass access controls.
Zoom has consistently patched similar Windows-side privilege escalation issues in recent cycles, including a Critical CVE-2025-49457 (CVSS 9.6) disclosed in August 2025, which also allowed unauthenticated network-based privilege escalation across multiple Windows clients.
| CVE ID | Bulletin | Product | Vulnerability Type | Severity | Published |
|---|---|---|---|---|---|
| CVE-2026-30903 | ZSB-26005 | Zoom Workplace for Windows | External Control of File Name or Path | Critical | 03/10/2026 |
| CVE-2026-30902 | ZSB-26004 | Zoom Clients for Windows | Improper Privilege Management | High | 03/10/2026 |
| CVE-2026-30901 | ZSB-26003 | Zoom Rooms for Windows | Improper Input Validation | High | 03/10/2026 |
| CVE-2026-30900 | ZSB-26002 | Zoom Workplace Clients for Windows | Improper Check | High | 03/10/2026 |
Zoom has issued patches addressing all four vulnerabilities. Organizations and individual users should take the following steps immediately:
Zoom urges all Windows users to apply these updates without delay, noting that no additional mitigations are available outside of upgrading to the patched version.
Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.
The post Zoom Workplace for Windows Vulnerabilities Allow Privilege Escalation appeared first on Cyber Security News.
A series of intrusions in early 2026 in which threat actors compromised FortiGate Next-Generation Firewalls…
Amy Guimond, who grew up in Henniker, moved back to town a few years ago…
Town officials in Pembroke have learned from past mistakes. This year, when the wireless microphone…
A long-vacant house on Airport Road sustained major damage in a fire early Saturday morning.…
Amy Bogart has had enough of the state failing to adequately fund education programs, such…
By the time Kelly Bokhan came to Loudon’s town meeting, she felt her wallet was…
This website uses cookies.