Article Details
Scrape Timestamp (UTC): 2026-01-21 15:44:46.307
Source: https://thehackernews.com/2026/01/zoom-and-gitlab-release-security.html
Original Article Text
Click to Toggle View
Zoom and GitLab Release Security Updates Fixing RCE, DoS, and 2FA Bypass Flaws. Zoom and GitLab have released security updates to resolve a number of security vulnerabilities that could result in denial-of-service (DoS) and remote code execution. The most severe of the lot is a critical security flaw impacting Zoom Node Multimedia Routers (MMRs) that could permit a meeting participant to conduct remote code execution attacks. The vulnerability, tracked as CVE-2026-22844 and discovered internally by its Offensive Security team, carries a CVSS score of 9.9 out of 10.0. "A command injection vulnerability in Zoom Node Multimedia Routers (MMRs) before version 5.2.1716.0 may allow a meeting participant to conduct remote code execution of the MMR via network access," the company noted in a Tuesday alert. Zoom is recommending that customers using Zoom Node Meetings, Hybrid, or Meeting Connector deployments update to the latest available MMR version to safeguard against any potential threat. There is no evidence that the security flaw has been exploited in the wild. The vulnerability affects the following versions - GitLab Releases Patches for Severe Flaws The disclosure comes as GitLab released fixes for multiple high-severity flaws affecting its Community Edition (CE) and Enterprise Edition (EE) that could result in DoS and a bypass of two-factor authentication (2FA) protections. The shortcomings are listed below - Also remediated by GitLab are two other medium-severity bugs that could also trigger a DoS condition (CVE-2025-13335, CVSS score: 6.5, and CVE-2026-1102, CVSS score: 5.3) by configuring malformed Wiki documents that bypass cycle detection and sending repeated malformed SSH authentication requests, respectively.
Daily Brief Summary
Zoom has issued a critical update to fix a command injection vulnerability in its Node Multimedia Routers, which could allow remote code execution by meeting participants.
The vulnerability, identified as CVE-2026-22844, holds a CVSS score of 9.9, indicating its potential severity if exploited.
Zoom advises users of Node Meetings, Hybrid, or Meeting Connector deployments to upgrade to the latest version to mitigate risks.
No current evidence suggests this Zoom vulnerability has been exploited in real-world scenarios.
Concurrently, GitLab has released patches for high-severity vulnerabilities in its Community and Enterprise Editions, addressing potential DoS and 2FA bypass issues.
GitLab's updates also rectify medium-severity bugs that could lead to DoS conditions via malformed Wiki documents and SSH authentication requests.
These proactive measures by Zoom and GitLab aim to enhance security and protect users from potential exploitation.