Zoom has patched a number of security issues
One of the flaws allowed for remote code execution in Zoom
Zoom has patched several security vulnerabilities, including a high-severity one that could allow attackers to remotely execute code on the target endpoint.
The bug, first discovered by Google Project Zero security researcher Ivan Fratric, can be exploited without any interaction on the victim’s side.
“The only ability an attacker needs is to be able to send messages to the victim over Zoom chat over XMPP protocol," Fratric said in his explanation of the flaw.
Zoom security flaws
Tracked as CVE-2022-22786, the flaw revolves around the fact that Zoom’s server, and that of the client, use different XML parsing libraries, and as a result, XMPP messages get parsed differently by the two. It’s only found on Windows devices.
By sending a specific message, an attacker can force the target client to connect to a middle server, and get an old, 2019 version of Zoom, installed. That helps the attacker launch a more devastating attack.
"The installer for this version is still properly signed, however, it does not do any security checks on the .cab file," the researcher explained. "To demonstrate the impact of the attack, I replaced Zoom.exe in the .cab with a binary that just opens Windows Calculator app and observed Calculator being opened after the 'update' was installed."
The flaw was addressed in the video conferencing platform's latest update. All users are urged to patch to version 5.10.0 as soon as possible. This patch also fixes a number of other vulnerabilities, including one that enables sending user session cookies to a non-Zoom domain.
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
Other vulnerabilities fixed in this patch are tracked as CVE-2022-22784, CVE-2022-22785, and CVE-2022-22787 and have been observed on Android, iOS, Linux, macOS, and Windows operating systems.
According to ZDNet, Fratric first discovered the flaws in February this year, while Zoom fixed a little under two months later, on April 24.
Via: ZDNet
Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.