CVE-2026-30903

CRITICAL
2026-03-11 [email protected]
9.6
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

2
Analysis Generated
Mar 12, 2026 - 22:06 vuln.today
CVE Published
Mar 11, 2026 - 15:16 nvd
CRITICAL 9.6

Description

External Control of File Name or Path in the Mail feature of Zoom Workplace for Windows before 6.6.0 may allow an unauthenticated user to conduct an escalation of privilege via network access.

Analysis

File path control in Zoom Workplace for Windows Mail feature before 6.6.0.

Sign in for full analysis, threat intelligence, and remediation guidance.

Remediation

Within 24 hours: Audit all Zoom Workplace deployments to identify affected versions and document inventory; issue communication to users restricting Mail feature usage where possible. Within 7 days: Implement network segmentation to limit Zoom Mail traffic; deploy Web Application Firewall rules to block suspicious file path manipulation attempts; consider disabling the Mail feature if business-critical alternatives exist. …

Sign in for detailed remediation steps.

Priority Score

48
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +48
POC: 0

Share

CVE-2026-30903 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy