Zoom patches critical vulnerability again after prior fix was bypassed

 

It is time for Zoom customers on Mac to replace—once more. After Zoom patched a vulnerability in its Mac auto-update utility that might give malicious actors root entry earlier this week, the video conferencing software program firm issued another patch Wednesday, noting that the prior repair could possibly be bypassed.

 

Zoom customers on macOS ought to download and run model 5.11.6 (9890), launched on August 17. You too can test Zoom’s menu bar for updates. Ready for an automated replace may leave you waiting days whereas this exploit is publicly recognized.

 

Zoom’s incomplete repair was reported by Zoom customers on Mac safety researcher Csaba Fitzl, aka theevilbit of Offensive Safety. Zoom credited Fitzl in its safety bulletin (ZSB-22019) and issued a patch the day earlier than Fitzl tweeted about it.

 

Neither Fitzl nor Zoom detailed how Fitzl was in a position to bypass the repair for the vulnerability first discovered by Patrick Wardle, founding father of the Objective-See Foundation. Wardle spoke at Def Con last week about how Zoom’s auto-update utility held onto its privileged standing to put in Zoom packages however could possibly be tricked into verifying different packages. That meant malicious actors may use it to downgrade Zoom for higher exploit entry and even to realize root entry to the system.

Leave a Reply

Your email address will not be published. Required fields are marked *