Security researcher reveal Zoom flaws that could’ve allowed attackers to take over your Mac

Zoom’s auto-update option can help users ensure they have the latest and most secure version of video conferencing software, which has had several privacy and security issues over the years. However, a Mac security researcher has reported vulnerabilities he found in the tool that attackers could have exploited to take full control of a victim’s computer at this year’s DefCon. Corresponding WiredPatrick Wardle presented two security vulnerabilities during the conference. He found the first in the app’s signature check, which certifies the integrity of the update to be installed and checks whether it is a new version of Zoom. In other words, it is responsible for preventing attackers from tricking the automatic update installer into downloading an older and more vulnerable version of the app.

Wardle discovered that attackers could bypass signature verification by naming their malware file a certain way. And once inside, they could gain root access and control victim’s Mac. The edge says Wardle reported the bug to Zoom back in December 2021, but included the fix it introduced Another Insect. This second vulnerability could have provided attackers with a way to bypass Zoom’s safeguards put in place to ensure an update delivers the latest version of the app. Wardle has reportedly found that it’s possible to get a tool that facilitates Zoom’s update distribution to accept an older version of the video conferencing software.

Zoom has already fixed this bug, but Wardle found another vulnerability, which he also presented at the conference. He discovered that there is a point in time between the autoinstaller scanning a software package and the actual installation process that allows an attacker to inject malicious code into the update. A downloaded package intended for installation can apparently retain its original read and write permissions, allowing any user to change it. This means that even non-root users could exchange its content with malicious code and gain control over the targeted computer.

The company announced this The edge that it is now working on a patch for the new vulnerability that Wardle disclosed. As Wired notes, however, that attackers must already have access to a user’s device in order to exploit these vulnerabilities. While there’s no immediate danger to most people, Zoom advises users to “stay up to date with the latest version of the app” if one comes out.

All products recommended by Engadget are selected by our editorial team independently from our parent company. Some of our stories contain affiliate links. If you buy something through one of these links, we may receive an affiliate commission. Security researcher reveal Zoom flaws that could’ve allowed attackers to take over your Mac

Russell Falcon is an automatic aggregator of the all world’s media. In each content, the hyperlink to the primary source is specified. All trademarks belong to their rightful owners, all materials to their authors. If you are the owner of the content and do not want us to publish your materials, please contact us by email – The content will be deleted within 24 hours.

Related Articles

Back to top button