U.S. markets closed
  • S&P 500

    3,693.23
    -64.76 (-1.72%)
     
  • Dow 30

    29,590.41
    -486.27 (-1.62%)
     
  • Nasdaq

    10,867.93
    -198.88 (-1.80%)
     
  • Russell 2000

    1,679.59
    -42.72 (-2.48%)
     
  • Crude Oil

    79.43
    -4.06 (-4.86%)
     
  • Gold

    1,651.70
    -29.40 (-1.75%)
     
  • Silver

    18.83
    -0.78 (-3.99%)
     
  • EUR/USD

    0.9693
    -0.0145 (-1.47%)
     
  • 10-Yr Bond

    3.6970
    -0.0110 (-0.30%)
     
  • GBP/USD

    1.0857
    -0.0398 (-3.54%)
     
  • USD/JPY

    143.3300
    +0.9950 (+0.70%)
     
  • BTC-USD

    18,930.49
    -165.73 (-0.87%)
     
  • CMC Crypto 200

    434.61
    -9.92 (-2.23%)
     
  • FTSE 100

    7,018.60
    -140.92 (-1.97%)
     
  • Nikkei 225

    27,153.83
    -159.30 (-0.58%)
     

Security researcher reveal Zoom flaws that could've allowed attackers to take over your Mac

·Contributing Reporter
·2 min read
Cavan Images via Getty Images

Zoom's automatic update option can help users ensure that they have the latest, safest version of the video conferencing software, which has had multiple privacy and security issues over the years. A Mac security researcher, however, has reported vulnerabilities he found in the tool that attackers could have exploited to gain full control of a victim's computer at this year's DefCon. According to Wired, Patrick Wardle presented two vulnerabilities during the conference. He found the first one in the app's signature check, which certifies the integrity of the update being installed and examines it to make sure that it's a new version of Zoom. In other words, it's in charge of blocking attackers from tricking the automatic update installer into downloading an older and more vulnerable version of the app.

Wardle discovered that attackers could bypass the signature check by naming their malware file a certain way. And once they're in, they could get root access and control the victim's Mac. The Verge says Wardle disclosed the bug to Zoom back in December 2021, but the fix it rolled out contained another bug. This second vulnerability could have given attackers a way to circumvent the safeguard Zoom set in place to make sure an update delivers the latest version of the app. Wardle reportedly found that it's possible to trick a tool that facilitates Zoom's update distribution into accepting an older version of the video conferencing software.

Zoom already fixed that flaw, as well, but Wardle found yet another vulnerability, which he has also presented at the conference. He discovered that there's a point in time between the auto-installer's verification of a software package and the actual installation process that allows an attacker to inject malicious code into the update. A downloaded package meant for installation can apparently retain its original read-write permissions allowing any user to modify it. That means even users without root access could swap its contents with malicious code and gain control of the target computer.

The company told The Verge that it's now working on a patch for the new vulnerability Wardle has disclosed. As Wired notes, though, attackers need to have existing access to a user's device to be able to exploit these flaws. Even if there's no immediate danger for most people, Zoom advises users to "keep up to date with the latest version" of the app whenever one comes out.