Zoom and GitLab have both released critical security patches to address a range of high-severity vulnerabilities in their products. The most alarming is CVE-2026-22844, a vulnerability in Zoom Node Multimedia Routers (MMRs) with a CVSS score of 9.9, which could allow a remote, unauthenticated attacker to execute arbitrary code. GitLab's update is also significant, fixing multiple flaws including two that could be exploited for Denial-of-Service (DoS) attacks, potentially disrupting critical development and CI/CD pipelines. The releases underscore the persistent threat of vulnerabilities in widely-used collaboration and development platforms, and administrators are strongly advised to apply the updates without delay.
Other vulnerabilities patched by both vendors include potential two-factor authentication bypasses and other DoS flaws.
There are no workarounds for these critical vulnerabilities. The only course of action is to patch.
M1051 - Update Software.The only effective mitigation is to apply the security updates provided by Zoom and GitLab immediately.
Mapped D3FEND Techniques:
Given the critical 9.9 CVSS score for the Zoom vulnerability (CVE-2026-22844) and the high-impact DoS flaws in GitLab, immediate and comprehensive patching is non-negotiable. Organizations must activate their emergency patching procedures. For Zoom Node MMRs, this involves following Zoom's specific update guidance for the hardware. For GitLab, administrators should upgrade their instances to the latest patched version specified in the release announcement. A failure to patch the Zoom flaw could lead to a full network compromise, while ignoring the GitLab update could halt all development operations. These updates should be considered top priority for all security and IT operations teams.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats