Explorer

Zoom Has Fixed The Most Dangerous Meeting Vulnerability On Apple MacOS

Online video collaboration platform Zoom has fixed the most dangerous bug on Apple macOS that could allow hackers to take control of users' operating system when they open the meeting app.

Online video collaboration platform Zoom has fixed the most dangerous bug on Apple macOS that could allow hackers to take control of users' operating system when they open the meeting app. The company said in a security update that the Zoom client for meetings for macOS, starting with version 5.7.3 and before 5.11.5, "contains a vulnerability in the auto update process".

"A local low-privileged user could exploit this vulnerability to escalate their privileges to root," said the company,

Zoom acknowledged the issue (CVE-2022-28756) and said it has issued a fix in version 5.11.5 of the app on Mac, which users can now download. Earlier, a security researcher found a way that an attacker could leverage the macOS version of Zoom to gain access over the entire operating system.

According to The Verge, details of the exploit were released in a presentation by Mac security specialist Patrick Wardle at the Def Con hacking conference in Las Vegas last week. Zoom earlier fixed some of the bugs involved but the most dangerous one was still left on macOS, which has now been fixed. The exploit worked by targeting the installer for the Zoom application, which needs to run with special user permissions to install or remove the main Zoom application from a computer.

Meanwhile, last week a security researcher found a way that an attacker could leverage the macOS version of Zoom to gain access over the entire operating system. According to The Verge, details of the exploit were released in a presentation by Mac security specialist Patrick Wardle at the Def Con hacking conference in Las Vegas this week.

Zoom has already fixed some of the bugs involved, but the researcher also presented one unpatched vulnerability that still affects systems now.

The exploit works by targeting the installer for the Zoom application, which needs to run with special user permissions to install or remove the main Zoom application from a computer. Though the installer requires a user to enter their password on first adding the application to the system, Wardle found that an auto-update function then continually ran in the background with superuser privileges.

When Zoom issued an update, the updater function would install the new package after checking that it had been cryptographically signed by Zoom.

View More
Advertisement
Advertisement
25°C
New Delhi
Rain: 100mm
Humidity: 97%
Wind: WNW 47km/h
See Today's Weather
powered by
Accu Weather
Advertisement

Top Headlines

SpaDeX Mission Lifts Off: ISRO Is Sending Spinach, Its First Biological Payload, To Space For Special Study
SpaDeX Mission Lifts Off: ISRO Is Sending Spinach, Its First Biological Payload, To Space
Delhi LG VK Saxena Objects To Arvind Kejriwal Calling Atishi A ‘Temporary CM’, Terms It As ‘Insult’ To President
Delhi LG VK Saxena Objects To Arvind Kejriwal Calling Atishi A ‘Temporary CM’, Terms It As ‘Insult’
Nikita Singhania’s Allegations Against Atul Subhash: ‘Forced Me Out Of House Twice, Assaulted, Threatened To Kill’
Nikita Singhania’s Allegations Against Atul Subhash: Forced Me Out Of House, Threatened To Kill
Rahul Gandhi ‘Exploited’ Manmohan Singh’s Death: BJP Slams LoP’s Vietnam Trip. Congress Alleges ‘Diversion Politics’
Rahul ‘Exploited’ Manmohan Singh’s Death: BJP Slams LoP’s Vietnam Trip. Congress Hits Back
Advertisement
ABP Premium

Videos

PM Modi Highlights Constitution's Legacy in 117th 'Mann Ki Baat' AddressAstrologer Dr. Niti Sharma Reveals: How Will 2025 Be for People with Life Path Number 1?New Year Prediction: Astrologer Dr. Niti Sharma Reveals What 2025 Has in StorePrediction 2025: A Year of Major Changes, Sun and Mars to Have Significant Impact

Photo Gallery

Embed widget