• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services

Unpatched Essential Flaw Disclosed in Zoom Application for Windows 7 or Previously

You are here: Home / General Cyber Security News / Unpatched Essential Flaw Disclosed in Zoom Application for Windows 7 or Previously
July 10, 2020


A 0-day vulnerability has been identified in Zoom video conferencing application for Windows that could make it possible for an attacker to execute arbitrary code on a victim’s laptop or computer working Microsoft Windows 7 or older.
To correctly exploit the zoom vulnerability, all an attacker demands to do is tricking a Zoom person into performing some usual motion like opening a been given document file. No security warning is brought on or demonstrated to the consumer at the time of the attack.
The vulnerability has been found by a researcher who documented it to Acros Stability, who then reported the flaw to the Zoom safety workforce earlier nowadays. The researcher needs to continue being nameless.
Although the flaw is current in all supported variations of the Zoom shopper for Windows, it is only exploitable on systems operating Home windows 7 and older Home windows programs because of to some specific system traits.
“This vulnerability is only exploitable on Home windows 7 and earlier Home windows versions. It is likely also exploitable on Home windows Server 2008 R2 and previously however we didn’t exam that,” Mitja Kolsek, 0patch co-founder, explained in a website submit printed Thursday.

Although Microsoft ended official aid for Home windows 7 this January and encouraged buyers to change to more protected versions of the operating technique, Windows 7 is still commonly used by customers and organizations at large.
Scientists at Acros Safety, the creators of 0patch, have created a micro patch for all versions of Zoom Shopper for Windows (starting up with model 5..3 and all up to the most up-to-date model 5.1.2) to handle the stability concern and produced them to absolutely everyone for free until Zoom Online video Communications delivers an formal security patch.
When a consumer permits 0patch on their procedure, the destructive code sent by an attacker does not get executed when a Zoom consumer clicks on the “Start out Video clip” button.
“Zoom Shopper options a fairly persistent automobile-update features that is possible to hold household users up-to-date except if they definitely will not want to be,” Kolsek explained.
“Even so, company admins normally like to preserve handle of updates and may possibly continue to be a couple of versions guiding, primarily if no protection bugs had been fastened in the most up-to-date versions (which is now the case).”
Researchers at Acros Security have also produced a working evidence-of-concept exploit for the vulnerability, which they have shared with Zoom and will not launch until eventually the organization fixes the situation.
Having said that, the organization has posted a evidence-of-concept movie demonstration that reveals how a malicious exploit for this vulnerability can be triggered by clicking the “start video clip” button in the Zoom Client.

No Patch! What should really the afflicted people do?

Till Zoom releases a fix for the problem, people can briefly quit applying the Zoom customer on their more mature variations of Windows, or update their OS to a newer variation.
End users can also implement micropatch unveiled by Acros Safety, but considering that it comes from a third social gathering software program enterprise and not Zoom by itself, I would not suggest accomplishing that.
Owing to the ongoing coronavirus outbreak, the use of Zoom movie conferencing software package has skyrocketed more than the previous several months, as it is being made use of by not just enterprises but also tens of millions of regular end users across the world to cope with schooling, enterprise, social engagement, and whatnot.UPDATE: In a assertion furnished to The Hacker Information, Zoom confirmed it has now patched the vulnerability pointed out earlier mentioned with Zoom client edition 5.1.3 launch.
“Customers can assist hold themselves protected by applying present updates or downloading the most up-to-date Zoom software package with all latest security updates from https://zoom.us/obtain.”

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


The ZOOM saga continues…

Just previous month, Zoom dealt with two crucial vulnerabilities in its video conferencing computer software for Home windows, macOS, or Linux desktops that could have allowed attackers to hack into the units of team chat members or an individual recipient remotely.
In April, a collection of troubles have been uncovered and claimed in Zoom, which raised privateness and protection fears encompassing the video conferencing software package among the thousands and thousands of its customers.
Earlier this year, Zoom also patched a really serious privacy bug in its computer software that could have authorized uninvited folks to sign up for private meetings and remotely eavesdrop on non-public audio, movie, and paperwork shared in the course of the session.
Identified this post fascinating? Stick to THN on Facebook, Twitter  and LinkedIn to go through extra exclusive information we put up.

Previous Post: « Zoom repairing zero-working day vulnerability in Home windows client
Next Post: Conti ransomware encrypts files more rapidly, targets SMB network shares »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • NightEagle APT Exploits Microsoft Exchange Flaw to Target China’s Military and Tech Sectors
  • Your AI Agents Might Be Leaking Data — Watch this Webinar to Learn How to Stop It
  • Critical Sudo Vulnerabilities Let Local Users Gain Root Access on Linux, Impacting Major Distros
  • Google Ordered to Pay $314M for Misusing Android Users’ Cellular Data Without Permission
  • Massive Android Fraud Operations Uncovered: IconAds, Kaleidoscope, SMS Malware, NFC Scams
  • Over 40 Malicious Firefox Extensions Target Cryptocurrency Wallets, Stealing User Assets
  • The Hidden Weaknesses in AI SOC Tools that No One Talks About
  • Chinese Hackers Exploit Ivanti CSA Zero-Days in Attacks on French Government, Telecoms
  • Critical Cisco Vulnerability in Unified CM Grants Root Access via Static Credentials
  • North Korean Hackers Target Web3 with Nim Malware and Use ClickFix in BabyShark Campaign

Copyright © TheCyberSecurity.News, All Rights Reserved.