VYPR
High severity7.8NVD Advisory· Published Mar 11, 2026· Updated May 14, 2026

CVE-2026-30900

CVE-2026-30900

Description

Improper Check of minimum version in update functionality of certain Zoom Clients for Windows may allow an authenticated user to conduct an escalation of privilege via local access.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

An improper version check in Zoom Workplace Clients for Windows update functionality lets authenticated local attackers escalate privilege.

Vulnerability

Overview

The vulnerability, identified as CVE-2026-30900, resides in the update functionality of certain Zoom clients for Windows. The root cause is an improper check of the minimum version during the update process. This flaw allows an authenticated user to potentially bypass version validation controls [1].

Exploitation

Prerequisites

Exploitation requires the attacker to have local access to the affected Windows system and valid authentication credentials. No network-based attack vector is needed; the CVSS vector string (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) confirms a local attack with low complexity and low privileges required. The attacker does not need user interaction [1].

Impact

Successful exploitation could lead to a full escalation of privilege, granting the attacker higher-level system access. The CVSS confidentiality, integrity, and availability impact ratings are all High, meaning the attacker could potentially read sensitive data, modify system configurations, or cause service disruption [1].

Mitigation

Zoom has released patches. Affected products include Zoom Workplace for Windows before version 6.6.11 in the 6.6.x branch, and Zoom Workplace VDI Client for Windows version 6.6.10 specifically. Users should update to the latest versions available at zoom.us/download [1].

References
  1. ZSB-26002

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.