Zoom and GitLab have both released critical security patches to address a range of high-severity vulnerabilities in their products. The most alarming is CVE-2026-22844, a vulnerability in Zoom Node Multimedia Routers (MMRs) with a CVSS score of 9.9, which could allow a remote, unauthenticated attacker to execute arbitrary code. GitLab's update is also significant, fixing multiple flaws including two that could be exploited for Denial-of-Service (DoS) attacks, potentially disrupting critical development and CI/CD pipelines. The releases underscore the persistent threat of vulnerabilities in widely-used collaboration and development platforms, and administrators are strongly advised to apply the updates without delay.
Other vulnerabilities patched by both vendors include potential two-factor authentication bypasses and other DoS flaws.
There are no workarounds for these critical vulnerabilities. The only course of action is to patch.
M1051 - Update Software.Zoom RCE (CVE-2026-22844) details: command injection, exploitable by authenticated meeting participant. Affected versions (prior to 5.2.1716.0) and detection methods released.
The new article provides crucial specifics for CVE-2026-22844, clarifying the vulnerability as a command injection exploitable by an authenticated participant within a meeting, a more precise attack vector than previously stated. Affected versions are identified as prior to 5.2.1716.0. The update also includes detailed cyber observables and detection methods, such as monitoring for unusual child processes and outbound network connections from Zoom Node routers. Zoom reports no active exploitation in the wild. This new information significantly enhances understanding of the threat and mitigation strategies.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats