CVE-2026-30906: CWE-426: Untrusted Search Path in Zoom Communications Zoom Rooms
Untrusted search path in the installer for Zoom Rooms for Windows before version 7.0.0 may allow an authenticated user to enable an escalation of privilege via local access.
AI Analysis
Technical Summary
This vulnerability (CVE-2026-30906) affects Zoom Rooms for Windows before version 7.0.0. It is classified as CWE-426 (Untrusted Search Path), where the installer does not securely validate the search path for dependencies or executables. An authenticated user with local access could exploit this to escalate privileges on the affected system. The CVSS v3.1 base score is 7.8, indicating high severity, with attack vector local, low attack complexity, low privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. No patch or official remediation level has been disclosed by Zoom Communications as of the publication date.
Potential Impact
Successful exploitation could allow an authenticated local user to escalate their privileges, potentially gaining higher system rights than intended. This could lead to full system compromise, including unauthorized access to sensitive data and disruption of system availability. The vulnerability does not appear to be remotely exploitable and requires local access with some privileges.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until an official fix is released, restrict local access to trusted users only and monitor for any suspicious activity related to Zoom Rooms installer usage. Avoid running the installer in untrusted environments or with elevated privileges unnecessarily.
CVE-2026-30906: CWE-426: Untrusted Search Path in Zoom Communications Zoom Rooms
Description
Untrusted search path in the installer for Zoom Rooms for Windows before version 7.0.0 may allow an authenticated user to enable an escalation of privilege via local access.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
This vulnerability (CVE-2026-30906) affects Zoom Rooms for Windows before version 7.0.0. It is classified as CWE-426 (Untrusted Search Path), where the installer does not securely validate the search path for dependencies or executables. An authenticated user with local access could exploit this to escalate privileges on the affected system. The CVSS v3.1 base score is 7.8, indicating high severity, with attack vector local, low attack complexity, low privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. No patch or official remediation level has been disclosed by Zoom Communications as of the publication date.
Potential Impact
Successful exploitation could allow an authenticated local user to escalate their privileges, potentially gaining higher system rights than intended. This could lead to full system compromise, including unauthorized access to sensitive data and disruption of system availability. The vulnerability does not appear to be remotely exploitable and requires local access with some privileges.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until an official fix is released, restrict local access to trusted users only and monitor for any suspicious activity related to Zoom Rooms installer usage. Avoid running the installer in untrusted environments or with elevated privileges unnecessarily.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Zoom
- Date Reserved
- 2026-03-06T18:44:57.631Z
- Cvss Version
- 3.1
- State
- PUBLISHED
- Remediation Level
- null
Threat ID: 6a04c4b8cbff5d8610fad35c
Added to database: 5/13/2026, 6:36:40 PM
Last enriched: 5/13/2026, 6:51:32 PM
Last updated: 5/13/2026, 8:06:11 PM
Views: 31
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.