A Command Injection vulnerability in Zoom Node Multimedia Routers (MMRs) before version 5.2.1716.0 may allow a meeting participant to conduct remote c...
Description
A Command Injection vulnerability in Zoom Node Multimedia Routers (MMRs) before version 5.2.1716.0 may allow a meeting participant to conduct remote code execution of the MMR via network access.
AI Analyst Comment
Remediation
Update A Command Injection vulnerability in Zoom Node Multimedia Routers Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
Executive Summary:
A critical command injection vulnerability has been discovered in Zoom Node Multimedia Routers (MMRs), the core infrastructure responsible for processing meeting traffic. This flaw allows a malicious participant within a meeting to take complete control of the server, potentially leading to service disruption, data theft, and further intrusion into the corporate network. Due to the high severity and potential impact, immediate remediation is strongly advised.
Vulnerability Details
CVE-ID: CVE-2026-22844
Affected Software: Zoom Node Multimedia Routers (MMRs)
Affected Versions: All versions before 5.2.1716.0
Vulnerability: This is a command injection vulnerability that can be triggered by a meeting participant. An attacker can send specially crafted data packets during a meeting session to the MMR. The server fails to properly sanitize this input, interpreting it as a system command and executing it with the privileges of the MMR service. This allows for unauthenticated remote code execution (RCE) on the underlying server by anyone who can join a meeting hosted on a vulnerable MMR.
Business Impact
This vulnerability is rated as critical with a CVSS score of 9.9, representing an extremely high risk to the organization. Successful exploitation could lead to a complete compromise of the affected Zoom Node Multimedia Router. The business impact includes the potential for eavesdropping on sensitive meetings, theft of proprietary data, disruption of critical communication services, and the use of the compromised server as a pivot point to launch further attacks against the internal corporate network.
Remediation Plan
Immediate Action:
Update all affected Zoom Node Multimedia Routers to version 5.2.1716.0 or later as recommended by the vendor. After patching, monitor system logs for any signs of compromise that may have occurred prior to the update. Review access logs for any unusual meeting participant activity.
Proactive Monitoring:
Compensating Controls:
Exploitation Status
Public Exploit Available: false
Analyst Notes:
As of Jan 20, 2026, there are no known public exploits or active attacks leveraging this vulnerability. However, given the critical severity (CVSS 9.9) and the relative simplicity of the attack vector (requiring only meeting participant access), it is highly probable that threat actors will develop a functional exploit in the near future. Organizations should assume this vulnerability will be exploited.
Analyst Recommendation
Given the critical severity (CVSS 9.9) of this remote code execution vulnerability, immediate action is required. Organizations must prioritize the deployment of the vendor-supplied patch for all affected Zoom Node Multimedia Routers. Although this vulnerability is not yet listed on the CISA Known Exploited Vulnerabilities (KEV) catalog, its high impact and potential for widespread exploitation make it a significant threat. All vulnerable systems should be patched or have compensating controls applied immediately to prevent a potential compromise.