Skip to main content

CVE-2024-24697: CWE-426 Untrusted Search Path in Zoom Video Communications, Inc. Zoom Clients

High
VulnerabilityCVE-2024-24697cvecve-2024-24697cwe-426
Published: Tue Feb 13 2024 (02/13/2024, 23:53:43 UTC)
Source: CVE
Vendor/Project: Zoom Video Communications, Inc.
Product: Zoom Clients

Description

Untrusted search path in some Zoom 32 bit Windows clients may allow an authenticated user to conduct an escalation of privilege via local access.

AI-Powered Analysis

AILast updated: 07/05/2025, 06:25:03 UTC

Technical Analysis

CVE-2024-24697 is a high-severity vulnerability identified in certain 32-bit Windows clients of Zoom Video Communications, Inc. This vulnerability is classified under CWE-426, which pertains to an untrusted search path. Specifically, the issue arises because the Zoom client improperly handles the search path for loading executable files or libraries. An authenticated user with local access to the affected system can exploit this flaw to escalate privileges. The vulnerability requires local access and user interaction, and the attacker must already have some level of authenticated access (high privileges required). The CVSS 3.1 base score is 7.2, indicating a high impact on confidentiality, integrity, and availability, with a complex attack vector due to the need for local access and user interaction. The vulnerability allows an attacker to execute malicious code with elevated privileges by placing a malicious executable or library in a location that the Zoom client searches before the legitimate one, thereby hijacking the execution flow. This can lead to full system compromise, data theft, or disruption of services. No known exploits are currently reported in the wild, and no official patches have been linked yet, though the vulnerability has been publicly disclosed since February 2024.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially in environments where Zoom is widely used on Windows 32-bit systems. The potential for privilege escalation means that an attacker who gains local access—whether through physical access, social engineering, or other means—could gain control over the affected machine. This could lead to unauthorized access to sensitive communications, intellectual property, or personal data, violating GDPR and other data protection regulations. Additionally, compromised systems could be used as footholds for lateral movement within corporate networks, increasing the risk of broader breaches. The impact is particularly critical for sectors relying heavily on Zoom for communication, such as finance, healthcare, government, and critical infrastructure, where confidentiality and integrity of communications are paramount.

Mitigation Recommendations

Organizations should prioritize upgrading affected Zoom clients to versions that address this vulnerability once patches are released. Until then, practical mitigations include: 1) Restricting local access to systems running vulnerable Zoom clients to trusted personnel only; 2) Implementing application whitelisting and restricting execution of unauthorized binaries or DLLs in directories that Zoom searches; 3) Employing endpoint detection and response (EDR) tools to monitor for suspicious local privilege escalation attempts; 4) Educating users about the risks of local privilege escalation and enforcing strict user account controls to minimize privileges; 5) Considering migration to 64-bit Zoom clients if feasible, as the vulnerability is reported specifically for 32-bit versions; 6) Regularly auditing and hardening system PATH environment variables and directory permissions to prevent untrusted code execution; 7) Monitoring vendor advisories closely for official patches and applying them promptly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Zoom
Date Reserved
2024-01-26T22:56:14.681Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9819c4522896dcbd8492

Added to database: 5/21/2025, 9:08:41 AM

Last enriched: 7/5/2025, 6:25:03 AM

Last updated: 8/12/2025, 11:53:29 AM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats