Video conferencing software: Zoom Node possible entry point for malware attacks

A security update closes a critical vulnerability in Zoom Node.

listen Print view
A symbolic update reminder.

(Image: Ole.CNX / Shutterstock.com)

1 min. read

Zoom Node servers are vulnerable, and attackers can execute malicious code. To prevent system compromise, administrators must install the available security patch.

Via Zoom Node, administrators for companies host Zoom workloads such as meetings and video calls. In a warning message, the developers state that the now-closed security vulnerability (CVE-2026-22844) is classified with a threat level of “critical.

The vulnerability specifically affects the Multimedia Routers (MMRs) component. For an attack to succeed, an attacker must be a participant in a meeting. If this is the case, they can execute malicious code through an unspecified method.

Videos by heise

The warning message provides no indication that attackers are already exploiting the vulnerability. However, administrators should not delay patching and should install one of the secured versions promptly. All previous versions are said to be vulnerable.

  • Zoom Node Meetings Hybrid (ZMH) MMR module 5.2.1716.0
  • Zoom Node Meeting Connector (MC) MMR module 5.2.1716.0

(des)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.