Rewterz
Critical Oracle WebLogic Proxy Flaw Allows Server Compromise
January 21, 2026
Rewterz
Automated Attacks Breach FortiGate Firewalls, Exposing Configuration Data – Active IOCs
January 23, 2026

Zoom Command Injection Bug Enables Remote Code Execution

Severity

High

Analysis Summary

A critical command injection vulnerability, tracked as CVE-2026-22844, has been identified in Zoom Node Multimedia Routers (MMRs). This flaw carries a CVSS score of high, the maximum severity rating, indicating an extremely dangerous threat that demands immediate attention. The vulnerability exists in Zoom Node MMR versions prior to 5.2.1716.0, specifically affecting deployments in Zoom Node Meetings Hybrid (ZMH) and Zoom Node Meeting Connector (MC) environments. Exploitation requires only network access and low-level participant privileges, with no user interaction needed, making the risk highly significant in real-world scenarios.

The vulnerability allows attackers to execute arbitrary code directly on the MMR infrastructure, posing a full remote code execution (RCE) risk. Its impact spans the confidentiality, integrity, and availability (CIA) triad, enabling potential data theft, unauthorized system modification, and service disruption. Zoom has emphasized that an attacker with valid meeting participant credentials could leverage this flaw to compromise the entire system, highlighting its network-accessible vector and low attack complexity.

Organizations operating Zoom Node environments face urgent security challenges. The vulnerability specifically targets MMR modules running versions before 5.2.1716.0, making version verification and timely patching the most critical mitigation steps. Zoom has attributed the discovery to its Offensive Security team and provided detailed guidance via its Managing Updates for Zoom Node documentation, enabling administrators to systematically update affected modules and protect the infrastructure from exploitation.

Given the vulnerability’s high severity, ease of exploitation, and wide-reaching potential impact, organizations are strongly advised to prioritize immediate updates to MMR modules version 5.2.1716.0 or later. Treating this flaw with the same urgency as a zero-day vulnerability is essential to prevent compromise. Continuous monitoring, threat intelligence integration, and rapid patch deployment are recommended for maintaining secure Zoom Node deployments in hybrid or connector environments.

Impact

  • Sensitive Data Theft
  • Gain Access

Indicators of Compromise

CVE

  • CVE-2026-22844

Affected Vendors

Zoom

Remediation

  • Immediately identify affected MMR versions and check all Zoom Node MMR modules for versions prior to 5.2.1716.0.
  • Upgrade all affected MMR deployments (ZMH and MC) to version 5.2.1716.0 or later, following Zoom’s Managing Updates for Zoom Node documentation.
  • Limit network access to MMR infrastructure to trusted networks only and implement firewall rules or network segmentation until patches are applied.
  • Ensure meeting participants have the minimum required privileges and remove any unnecessary elevated access that could be exploited.
  • Monitor MMR logs for unusual activity or unauthorized commands and integrate threat intelligence feeds to detect potential exploitation attempts.
  • Confirm all MMR modules report the updated version 5.2.1716.0 or later and regularly recheck to ensure no outdated modules remain.
  • Share guidance with administrators and staff, emphasizing the urgency of applying patches immediately.