CVE-2026-30902
Published: 11 March 2026
Summary
CVE-2026-30902 is a high-severity Improper Privilege Management (CWE-269) vulnerability in Zoom Clients (inferred from references). Its CVSS base score is 7.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 3.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and AC-6 (Least Privilege).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly addresses improper privilege management by enforcing least privilege, preventing low-privileged authenticated users from escalating via the Zoom Client vulnerability.
Enforces access control policies to comprehensively block unauthorized privilege escalations enabled by local access in the flawed Zoom Client.
Requires timely flaw remediation, such as patching the specific improper privilege management vulnerability in Zoom Clients for Windows.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability is a local privilege escalation flaw (CWE-269) in the Zoom Windows client that directly enables T1068 by allowing a low-privileged authenticated user to gain full system control through exploitation of improper privilege management.
NVD Description
Improper Privilege Management in certain Zoom Clients for Windows may allow an authenticated user to conduct an escalation of privilege via local access.
Deeper analysisAI
CVE-2026-30902 is an Improper Privilege Management vulnerability, mapped to CWE-269, affecting certain Zoom Clients for Windows. Published on 2026-03-11T15:16:30.103, it carries a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). The flaw enables an authenticated user to escalate privileges through local access.
A local attacker with low privileges, such as a standard authenticated user on the Windows system, can exploit this vulnerability. Exploitation requires low complexity and no user interaction, allowing the attacker to achieve high impacts on confidentiality, integrity, and availability, potentially leading to full control over the affected system.
Zoom's security bulletin ZSB-26004 provides further details on the vulnerability, available at https://www.zoom.com/en/trust/security-bulletin/zsb-26004.
Details
- CWE(s)