CVE-2026-30900
Privilege Escalation via Version Check Flaw in Zoom Windows Client
Publication date: 2026-03-11
Last updated on: 2026-03-11
Assigner: Zoom Video Communications, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| zoom | workplace | to 6.6.11 (exc) |
| zoom | workplace_vdi | to 6.6.10 (exc) |
| zoom | meeting_sdk | to 6.6.11 (exc) |
| zoom | zoom_client | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-754 | The product does not check or incorrectly checks for unusual or exceptional conditions that are not expected to occur frequently during day to day operation of the product. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-30900 is a high-severity vulnerability in certain Zoom Workplace Clients for Windows. It occurs due to an improper check of the minimum version in the update functionality. This flaw may allow an authenticated user with local access and low privileges to escalate their privileges on the system without requiring any user interaction.
The vulnerability specifically affects Zoom Workplace for Windows versions before 6.6.11 in the 6.6.x branch, Zoom Workplace VDI Client for Windows version 6.6.10, and Zoom Meeting SDK for Windows before version 6.6.11 in the 6.6.x branch.
How can this vulnerability impact me? :
This vulnerability can impact you by allowing an authenticated local user with low privileges to escalate their privileges on the affected Zoom client software. This escalation can compromise the confidentiality, integrity, and availability of the system.
Because the attacker can gain higher privileges, they may be able to access sensitive information, modify data, or disrupt services on the affected machine.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
[{'type': 'paragraph', 'content': 'This vulnerability affects certain Zoom Workplace Clients for Windows versions before 6.6.11 in the 6.6.x branch, Zoom Workplace VDI Client for Windows version 6.6.10, and Zoom Meeting SDK for Windows before version 6.6.11 in the 6.6.x branch.'}, {'type': 'paragraph', 'content': 'To detect if your system is vulnerable, you should check the installed Zoom client version on your Windows machines.'}, {'type': 'list_item', 'content': 'Open Command Prompt or PowerShell and run: "wmic product where "name like \'%Zoom%\'" get Name, Version"'}, {'type': 'list_item', 'content': 'Alternatively, check the version via the Zoom client interface under Help > About Zoom.'}, {'type': 'paragraph', 'content': 'If the version is below 6.6.11 (or 6.6.10 for VDI client), the system is vulnerable.'}] [1]
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation step is to update the affected Zoom clients to the latest versions.
- Update Zoom Workplace Clients for Windows to version 6.6.11 or later.
- Update Zoom Workplace VDI Client for Windows to version 6.6.10 or later.
- Update Zoom Meeting SDK for Windows to version 6.6.11 or later.
Users can download the latest updates from https://zoom.us/download.