This vulnerability was reported to Zoom last December:
The exploit works by targeting the installer for the Zoom application, which needs to run with special user permissions in order to install or remove the main Zoom application from a computer. Though the installer requires a user to enter their password on first adding the application to the system, Wardle found that an auto-update function then continually ran in the background with superuser privileges.
When Zoom issued an update, the updater function would install the new package after checking that it had been cryptographically signed by Zoom. But a bug in how the checking method was implemented meant that giving the updater any file with the same name as Zoom’s signing certificate would be enough to pass the test—so an attacker could substitute any kind of malware program and have it be run by the updater with elevated privilege.
It seems that it’s not entirely fixed:
Following responsible disclosure protocols, Wardle informed Zoom about the vulnerability in December of last year. To his frustration, he says an initial fix from Zoom contained another bug that meant the vulnerability was still exploitable in a slightly more roundabout way, so he disclosed this second bug to Zoom and waited eight months before publishing the research.
More Stories
Friday Squid Blogging: Anniversary Post
I made my first squid post nineteen years ago this week. Between then and now, I posted something about squid...
US Sanctions Chinese Cybersecurity Firm for Global Botnet Attacks
The US government said that China based firm Integrity Technology Group provided infrastructure for Flax Typhoon to attack multiple US...
Atos Group Denies Space Bears’ Ransomware Attack Claims
Atos Group has denied the ransomware group Space Bears' claims of compromising its database, calling the allegations unfounded Read More
ShredOS
ShredOS is a stripped-down operating system designed to destroy data. GitHub page here. Read More
Crypto Boss Extradited to Face $40bn Fraud Charges
Former Terraform CEO Do Hyeong Kwon is now in the US facing federal fraud charges Read More
DDoS Disrupts Japanese Mobile Giant Docomo
Docomo has revealed a DDoS attack on Thursday took down key services Read More