We are aware of the Log4j vulnerability. Zoom is currently following the recommended mitigation steps from Apache and patching impacted systems by updating Log4j version 2.15.0 or implementing recommended mitigations.
The Zoom Security Team conducted a thorough investigation and believes Zoom Clients and on-premise deployments are not impacted.
For our own infrastructure, Zoom is following the recommended mitigation steps from Apache and patching any identified system
Thank you all for your questions, there is more information available in Zoom's public post regarding Log4j: Zoom Security Bulletin for CVE-2021-44228 and CVE-2021-45046