“A local low-privileged user could exploit this vulnerability to escalate their privileges to root.” “The Zoom Client for Meetings for macOS (Standard and for IT Admin)… contains a vulnerability in the auto-update process,” Zoom said in a security bulletin. Having taken advantage of the first stage, the more vulnerable version of Zoom, or a different package, would allow the attacker to gain root access to the victim’s Mac. In a rather strange two-step process, someone looking to target a Zoom Mac user could bypass the verification checker within Zoom, tricking the update manager into forcing Zoom to downgrade to an earlier, more easily exploitable version of Zoom or even force it to download an entirely different package. The exploit lies in the way the auto-update client in Zoom connects to a privileged daemon, or background service. The vulnerability has a Common Vulnerabilities and Exposure score of 8.8, with all Mac Zoom users recommended to update to the latest version of Zoom, 5.11.5, as soon as possible. computer through Zoom’s package installer. The vulnerability, named CVE-2022-28756, was found in Zoom for macOS versions 5.7.3 to 5.11.3 and potentially allowed an attacker to gain access and take over an Apple Inc. Zoom Video Communications Inc. today issued a patch for a vulnerability revealed by security researcher Patrick Wardle at the annual DEF CON Conference last week.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |