Patching the Zoom Zero-Day Vulnerability with JumpCloud and PowerShell

Written by Zach DeMeyer on April 14, 2020

Share This Article

Special thanks to JumpCloud friend, Tom Packert, for inspiring this blog!

As remote work becomes the new normal for many organizations, Zoom and other video chat applications are booming in popularity. Unfortunately, analysts have uncovered a zero-day vulnerability in Zoom, exposing user accounts to bad actors. Thankfully, using JumpCloud® Directory-as-a-Service® and its associated PowerShell Module, organizations can patch the Zoom vulnerability remotely on Windows® systems.

How it Works

The process for patching the Zoom zero-day using JumpCloud is fairly simple and straightforward. Note: Before you start you will need a JumpCloud account and the PowerShell Module. You can try JumpCloud for free for up to 10 users. The PowerShell Module is available for free download here.

  1. Log into the JumpCloud Admin Console and open Commands.
  2. Click + to add a command. (You can name the command whatever you wish, but we recommend something like “ZoomPatchApril2020” for ease-of-use.)
  3. Open the PowerShell Module and run the command found here.
  4. Select Command Runners and then choose which Admin account to use to run the command.
  5. Select Systems, then select all Windows systems to apply this patch, and click Save.
  6. Select the “ZoomPatchApril2020” command and click the Run Now button.
  7. Check your results in the results space at the bottom of the commands page.

That’s it! If you have any questions about the process or want to learn more about JumpCloud, please contact our expert team.

Zach DeMeyer

Zach is a Product Marketing Specialist at JumpCloud with a degree in Mechanical Engineering from the Colorado School of Mines. He loves being on the cutting edge of new technology, and when he's not working, he enjoys all things outdoors, music, and soccer.

Continue Learning with our Newsletter