Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

What about the two 0-day vulnerabilities in the Zoom macOS client version?

2025-02-24 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)05/31 Report--

This article shows you how the two 0-day vulnerabilities exist in the Zoom macOS client version, which are concise and easy to understand, which will definitely brighten your eyes. I hope you can get something through the detailed introduction of this article.

The researchers found two 0-day vulnerabilities in the macOS client version of Zoom web conferencing software. Unprivileged local attackers can take advantage of these two vulnerabilities to gain root access to the victim's microphone and camera.

Zoom has fixed these two vulnerabilities.

These two vulnerabilities were discovered by security researchers Patrick Wardle and Jamf. Due to the COVID-19 epidemic, more and more employees work from home in the past few weeks, and more and more attention has been paid to the safety measures of Zoom.

To exploit these two vulnerabilities, a local attacker needs to have a foothold on the system, so the attacker first needs to physically approach the victim's computer. Another attack scenario is for a remote attacker to use a pre-existing foothold on the target system to infect the target with malware.

The first vulnerability stems from a problem in the Zoom installer, which allows unprivileged attackers to gain root privileges. The Zoom installer uses the AuthorizationExecuteWithPrivileges Application programming Interface (API) feature, which is used to install ZoomMacOS applications without user interaction (using pre-installation scripts).

In fact, Apple (Apple) has eliminated the API because it does not validate a binary executed with root privileges. Because Zoom uses the API, this means that unprivileged local attackers or malware can secretly tamper with or replace the file to escalate privileges to root.

To exploit this vulnerability, a local attacker only needs to modify a binary file during installation and inject a runwithroot script. Since the file will not be authenticated, an attacker can eventually gain root access.

An attacker can use the second vulnerability to access Zoom users' microphones and cameras to record Zoom meetings or snoop on the victim's private life without the need for user access prompts.

Because Zoom is a web conferencing software, it requires access to the system microphone and camera. Although recent versions of macOS require explicit permission for these permissions, Zoom "exceptionally" allows third-party libraries to inject code. Wardle said that malicious third-party libraries can be loaded into Zoom's process / address space, automatically inheriting all access rights of Zoom, and attackers can eventually control these camera and microphone permissions.

Wardle said, "because of this" exceptional "authorization, we have shown how to inject malicious libraries into the trusted process context of Zoom. This gives malware the ability to record all Zoom meetings, or to launch Zoom in the background at any time to access microphones and cameras.

"because many companies now use Zoom for sensitive business meetings, the former vulnerability can cause problems. The problem caused by the latter vulnerability is that it provides malicious software with secret access to microphones or cameras without macOS alerts or prompts."

What about the two 0-day vulnerabilities that exist in the Zoom macOS client version? have you learned any knowledge or skills? If you want to learn more skills or enrich your knowledge reserve, you are welcome to follow the industry information channel.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report