Platform
zoom
Component
zoom-workplace
CVE-2026-30902 describes an improper privilege management vulnerability within certain Zoom Workplace clients for Windows. This flaw allows an authenticated user possessing local access to escalate their privileges, potentially gaining unauthorized control over the system. The vulnerability impacts versions of Zoom Workplace for Windows, details of which can be found in the references. A fix is available from Zoom.
Successful exploitation of CVE-2026-30902 could allow an attacker to gain elevated privileges on a Windows system where the vulnerable Zoom Workplace client is installed. This could enable them to execute arbitrary code, access sensitive data, or compromise the entire system. The attacker would need local access, meaning they must already be physically present or have obtained access through another means. The blast radius is limited to the affected system, but the impact on that system can be severe, potentially leading to complete compromise. While no direct precedent exists for this specific vulnerability, privilege escalation vulnerabilities often lead to similar outcomes as other privilege escalation exploits.
CVE-2026-30902 was publicly disclosed on 2026-03-11. The EPSS score is pending evaluation. No public proof-of-concept (POC) exploits are currently known. It is not listed on the CISA KEV catalog at the time of writing.
Exploit Status
EPSS
0.01% (2% percentile)
CISA SSVC
CVSS Vector
The primary mitigation for CVE-2026-30902 is to upgrade to the latest patched version of Zoom Workplace for Windows, as specified in the official Zoom advisory (see references). If immediate patching is not possible due to compatibility issues or testing requirements, consider restricting local access to systems running the vulnerable client. Implement strong password policies and multi-factor authentication to reduce the likelihood of an attacker gaining initial access. While a WAF or proxy cannot directly mitigate this local privilege escalation, they can help prevent initial compromise attempts. After upgrading, confirm the fix by attempting to escalate privileges using the previously exploitable method; the attempt should fail.
Update to the latest version of Zoom Workplace for Windows. This will resolve the privilege escalation vulnerability.
Vulnerability analysis and critical alerts directly to your inbox.
CVE-2026-30902 is a HIGH severity vulnerability in Zoom Workplace for Windows that allows an authenticated user with local access to escalate their privileges.
If you are using a version of Zoom Workplace for Windows (≤ see references), you may be affected. Check the official Zoom advisory for specific affected versions.
Upgrade to the latest patched version of Zoom Workplace for Windows. Refer to the official Zoom advisory for instructions and download links.
Currently, there are no reports of active exploitation of CVE-2026-30902, but it's crucial to apply the patch proactively.
Refer to the official Zoom security advisory, which can be found on the Zoom security website (see references in the CVE details).
Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.