Critical Zoom Flaw Allows Meeting Participants to Execute Code on Enterprise Servers (CVE-2026-22844)

Critical Zoom Flaw Allows Meeting Participants to Execute Code on Enterprise Servers (CVE-2026-22844)

Zoom has disclosed a critical command injection vulnerability affecting its enterprise hybrid meeting infrastructure that could allow a meeting participant to execute arbitrary code on backend servers.

The vulnerability, tracked as CVE-2026-22844, carries a CVSS score of 9.9 and affects Zoom Node Multimedia Routers (MMRs)—the components responsible for processing audio and video streams in Zoom's on-premises architecture.

What's Affected

The flaw impacts organizations running Zoom's hybrid or self-hosted meeting infrastructure:

  • Zoom Node Meetings Hybrid (ZMH) MMR module versions prior to 5.2.1716.0
  • Zoom Node Meeting Connector (MC) MMR module versions prior to 5.2.1716.0

Standard Zoom cloud users are not affected. The vulnerability specifically targets enterprises that deploy Zoom Node for on-premises meeting routing.

Technical Details

The CVSS vector (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H) indicates:

  • Network exploitable with low attack complexity
  • Low privileges required - a meeting participant can trigger it
  • No user interaction needed
  • Scope changed - compromise extends beyond the vulnerable component
  • High impact to confidentiality, integrity, and availability

The "scope changed" designation is particularly concerning, as it means successful exploitation could allow attackers to pivot from the MMR to other systems in the network.

Why It Matters

Organizations deploy Zoom Node infrastructure specifically to keep meeting traffic on-premises for security, compliance, or performance reasons. The irony of a critical RCE vulnerability in this security-conscious deployment model is not lost.

Any authenticated meeting participant—potentially including external guests—could exploit this flaw to compromise the MMR server, potentially gaining a foothold in the enterprise network.

Remediation

Administrators running Zoom Node deployments should update immediately to MMR version 5.2.1716.0 or later. Zoom provides update instructions in its Managing Updates for Zoom Node support documentation.

The vulnerability was discovered internally by Zoom's Offensive Security team.

Read more

ClickFix Campaign Compromises Legitimate Sites to Deploy MIMICRAT — A Custom C++ RAT With 22 Post-Exploitation Commands

ClickFix Campaign Compromises Legitimate Sites to Deploy MIMICRAT — A Custom C++ RAT With 22 Post-Exploitation Commands

Elastic Security Labs has disclosed a new ClickFix campaign that leverages compromised legitimate websites as delivery infrastructure to deploy a previously undocumented remote access trojan dubbed MIMICRAT (also tracked as AstarionRAT). The campaign, discovered earlier this month, demonstrates significant operational sophistication — from multi-stage PowerShell chains that bypass Windows security controls

By Zero Day Wire
ShinyHunters Linked to Device Code Vishing Attacks Targeting Microsoft Entra Accounts via OAuth 2.0 Abuse

ShinyHunters Linked to Device Code Vishing Attacks Targeting Microsoft Entra Accounts via OAuth 2.0 Abuse

A new wave of attacks is combining voice phishing (vishing) with OAuth 2.0 device authorization abuse to compromise Microsoft Entra accounts at technology, manufacturing, and financial organizations — bypassing traditional phishing infrastructure entirely. Sources told BleepingComputer they believe the ShinyHunters extortion gang is behind the campaigns, which the threat actors

By Zero Day Wire