Zoom < 5.16.5 — RCE
Improper input validation in the Zoom Desktop Client for Windows allows network-adjacent attackers to execute code. Update to Zoom 5.16.5 or later — Zoom auto-updates, but enterprise deployments may have auto-update disabled.
An attacker on the same network segment (e.g., corporate LAN or VPN) as the victim can exploit this during a Zoom session to execute code on the victim's machine. This is particularly concerning in corporate environments where all users share network access.
The Zoom Desktop Client for Windows has an improper input validation vulnerability that can be exploited by a network-adjacent attacker. This may allow the attacker to execute arbitrary code on the victim's system during a Zoom meeting or call.
Probably yes if any of these apply:
Affected OS versions
Zoom's Security Bulletin ZSB-24008 disclosed CVE-2024-24691 in February 2024 with a critical CVSS score of 9.6. Enterprise environments with locked-down Zoom deployments or disabled auto-update may have remained vulnerable for extended periods. Zoom clients that auto-update were patched quickly, but managed deployments require manual intervention.
Manual remediation steps
⏱ 5 minutes (application restart only)Check Zoom Version
# Check installed Zoom version:
$zoomPath = "$env:APPDATA\Zoom\bin\Zoom.exe"
if (-not (Test-Path $zoomPath)) {
$zoomPath = "$env:ProgramFiles\Zoom\bin\Zoom.exe"
}
if (Test-Path $zoomPath) {
(Get-Item $zoomPath).VersionInfo.FileVersion
}
# Vulnerable if older than 5.16.5
Update Zoom
# Option 1: From Zoom client
# Click profile picture > Check for Updates
# Option 2: Via winget
winget upgrade Zoom.Zoom
# Option 3: Download from https://zoom.us/download
Enterprise Deployment via GPO or SCCM
# Download the MSI installer from https://zoom.us/download#client_4meeting
# Deploy via SCCM Software Distribution or Intune as a Win32 app
# Or push via GPO Software Installation
Verify
(Get-Item "$env:APPDATA\Zoom\bin\Zoom.exe").VersionInfo.FileVersion
# Must show 5.16.5 or later
No tested PowerShell script for this entry yet. We’re prioritising automation based on user demand.
References