UPDATED 18:32 EDT / AUGUST 15 2022


Zoom patches vulnerability that could be exploited to gain root access in macOS

Zoom Video Communications Inc. today issued a patch for a vulnerability revealed by security researcher Patrick Wardle at the annual DEF CON Conference last week.

The vulnerability, named CVE-2022-28756, was found in Zoom for macOS versions 5.7.3 to 5.11.3 and potentially allowed an attacker to gain access and take over an Apple Inc. computer through Zoom’s package installer. The vulnerability has a Common Vulnerabilities and Exposure score of 8.8, with all Mac Zoom users recommended to update to the latest version of Zoom, 5.11.5, as soon as possible.

The exploit lies in the way the auto-update client in Zoom connects to a privileged daemon, or background service. In a rather strange two-step process, someone looking to target a Zoom Mac user could bypass the verification checker within Zoom, tricking the update manager into forcing Zoom to downgrade to an earlier, more easily exploitable version of Zoom or even force it to download an entirely different package. Having taken advantage of the first stage, the more vulnerable version of Zoom, or a different package, would allow the attacker to gain root access to the victim’s Mac.

“The Zoom Client for Meetings for macOS (Standard and for IT Admin)… contains a vulnerability in the auto-update process,” Zoom said in a security bulletin. “A local low-privileged user could exploit this vulnerability to escalate their privileges to root.”

Vulnerabilities in software are nothing new and Zoom has had its fair share in the past, particularly when the software went from a semi-obscure offering to becoming a verb for video conferencing as remote work became the norm during the COVID-19 pandemic. Where this vulnerability exposure becomes especially interesting is that it was exposed before Zoom had a proper patch available for it.

Typically, when security researchers or so-called “white-hat hackers” uncover a vulnerability, they contact the company behind the flawed software to allow them to patch the issue before details of the vulnerability are published. Zoom was informed of the vulnerability seven months before Wardle went public with the details and had ample opportunity to patch it properly, but it failed to do so.

According to Wardle, as reported by Naked Security by Sophos plc, just before DEF CON, Zoom said it had fixed the vulnerability. However, “after he applied the patch, he noticed that there was still a gaping hole in the update process.” The subsequent fix to the flawed fix then followed after Wardle’s presentation at DEF CON.

Wardle is well-known in the security community and at all stages did the right thing in not only informing Zoom but also attempting to assist it in fixing the issue. That it took Zoom seven months to address a known vulnerability and then to release a flawed update does not reflect well on it.

Image: Zoom

A message from John Furrier, co-founder of SiliconANGLE:

Your vote of support is important to us and it helps us keep the content FREE.

One click below supports our mission to provide free, deep, and relevant content.  

Join our community on YouTube

Join the community that includes more than 15,000 #CubeAlumni experts, including Amazon.com CEO Andy Jassy, Dell Technologies founder and CEO Michael Dell, Intel CEO Pat Gelsinger, and many more luminaries and experts.

“TheCUBE is an important partner to the industry. You guys really are a part of our events and we really appreciate you coming and I know people appreciate the content you create as well” – Andy Jassy