Budapest Post

Cum Deo pro Patria et Libertate
Budapest, Europe and world news

Zoom Lets Attackers Steal Windows Credentials, Run Programs via UNC Links

Zoom Lets Attackers Steal Windows Credentials, Run Programs via UNC Links

The Zoom Windows client is vulnerable to UNC path injection in the client's chat feature that could allow attackers to steal the Windows credentials of users who click on the link.

The zero-day Zoom flaws could give local, unprivileged attackers root privileges, and allow them to access victims’ microphone and camera.

Two zero-day flaws have been uncovered in Zoom’s macOS client version, according to researchers. The web conferencing platform vulnerabilities could give local, unprivileged attackers root privileges, and allow them to access victims’ microphone and camera.

The two flaws, uncovered by Patrick Wardle, principle security researcher with Jamf, emerge as Zoom comes under increased scrutiny over its security measures, particularly with more employees working from home over the past few weeks due to the coronavirus pandemic.

“Today, we uncovered two (local) security issues affecting Zoom’s macOS application,” said Wardle in a post this week. “Given Zoom’s privacy and security track record this should surprise absolutely zero people.”

The vulnerabilities come with the caveat that an attacker needs a local foothold on systems to exploit them – so bad actors would first need physical access to a victims’ computer. Another attack scenario could include a post-malware infection attack by a remote adversary with a preexisting foothold on the targeted system.

The first flaw stems from an issue with Zoom’s installer and allows unprivileged attackers to gain root privileges. The issue stems from the Zoom installer using the AuthorizationExecuteWithPrivileges application programming interface (API) function, which is used to install the Zoom MacOS app (leveraging preinstallation scripts) without any user interaction.

The API has actually been deprecated by Apple because the it does not attempt to validate a binary being executed at root. Because Zoom is using this API, it means “a local unprivileged attacker or piece of malware may be able to surreptitiously tamper or replace that item in order to escalate their privileges to root,” said Wardle.

To exploit Zoom, the local, non-privileged attacker could simply modify a binary to include the runwithroot script during an install. Because it would then not be validated they would ultimately gain root access.

The second zero day flaw gives attackers Zoom’s mic and camera access, allowing for a way to record Zoom meetings, or snoop in on victims’ personal lives – sans a user access prompt.

Zoom requires access to a system microphone and camera due to its nature of being a web conferencing platform. While recent versions of macOS require explicit user approval for these permissions, Zoom has an “exception” that allows code to be injected by third party libraries. Wardle said a malicious third party library could be loaded into Zoom’s process/address space – automatically inheriting all Zooms access rights, and ultimately giving attackers control over these camera and microphone permissions.

“Due to an ‘exception’ entitlement, we showed how to inject a malicious library into Zoom’s trusted process context,” Wardle said. “This affords malware the ability to record all Zoom meetings, or, simply spawn Zoom in the background to access the mic and webcam at arbitrary times.”

Wardle said, “the former [flaw] is problematic as many enterprises (now) utilize Zoom for (likely) sensitive business meetings, while the latter is problematic as it affords malware the opportunity to surreptitious access either the mic or the webcam, with no macOS alerts and/or prompts.”



Other Security Flaws

Zoom security issues are snowballing. The FBI on Tuesday warned of multiple reports of conferences being disrupted by pornographic or hate images and threatening language, in so-called “Zoom-bombing” attacks. These include a Massachusetts high school online classroom using Zoom, where an unidentified individual dialed in, yelled a profanity and then shouted the teacher’s home address in the middle of instruction, said the FBI’s report.

On Tuesday, security researchers uncovered a Universal Naming Convention (UNC) path injection vulnerability in the Zoom Windows client, which could enable attackers to steal Windows credentials of users. The flaw was first discovered by a Twitter user under the handle _g0dmode, and then verified by security researcher Matthew Hickey, with cybersecurity firm Hacker House.

In chat messages on its platform, Zoom automatically converts UNC paths into clickable links. A UNC path is a PC format for specifying the location of resources on a local-area network (LAN), which can be used to access network resources.

Once a victim in the chat clicks on the linked UNC path, Windows will attempt to connect to the link using an SMB file sharing protocol, according to a report by Bleeping Computer. By default, this transmits the victim’s login name and password. The password is hashed via NTLM, but can easily be sniffed out and cracked by attackers (using free tools like Hashcat).

A separate Zoom issue, reported Wednesday by Motherboard, shows that Zoom is leaking the email addresses and photos of thousands of users. This is due to an issue in Zoom’s “Company Directory,” where the platform automatically adds people to other’s lists of contacts if they use an email address sharing the same domain.

“By default, your Zoom contacts directory contains internal users in the same organization, who are either on the same account or who’s email address uses the same domain as yours (except for publicly used domains including gmail.com, yahoo.com, hotmail.com, etc) in the Company Directory section,” according to Zoom’s support page.
AI Disclaimer: An advanced artificial intelligence (AI) system generated the content of this page on its own. This innovative technology conducts extensive research from a variety of reliable sources, performs rigorous fact-checking and verification, cleans up and balances biased or manipulated content, and presents a minimal factual summary that is just enough yet essential for you to function as an informed and educated citizen. Please keep in mind, however, that this system is an evolving technology, and as a result, the article may contain accidental inaccuracies or errors. We urge you to help us improve our site by reporting any inaccuracies you find using the "Contact Us" link at the bottom of this page. Your helpful feedback helps us improve our system and deliver more precise content. When you find an article of interest here, please look for the full and extensive coverage of this topic in traditional news sources, as they are written by professional journalists that we try to support, not replace. We appreciate your understanding and assistance.
Newsletter

Related Articles

0:00
0:00
Close
U.S. and Hungarian Officials Talk About Economic Collaboration and Sanctions Strategy
Technology Giants Activate Lobbying Campaigns Against Strict EU Regulations
Pope Francis Admitted to Hospital in Rome Amid Increasing Speculation on Succession
Zelensky Calls on World Leaders to Back Peace as Tensions Rise with Trump
UK Leader Keir Starmer Calls for US Security Guarantee in Ukraine Peace Deal
NATO Chief Urges Higher Defense Expenditure in Europe
The negotiation teams of Trump and Putin meet directly, establishing the groundwork for a significant advancement.
Rubio Touches Down in Riyadh Before Key U.S.-Russia Discussions
Students in Serbian universities Unite to Hold Coordinated Protests for Accountability.
US State Department Removes Taiwan Independence Statement from Website
Abolishing opposition won't protect Germany from Nazism—this is precisely what led Germany to become Nazi!
Transatlantic Gold Rush: Traders Shift Bullion in Response to Tariff Anxieties and Market Instability
Bill Ackman Backs Uber as the Company Shifts Towards Profitability
AI Titans Challenge Nvidia's Supremacy in Light of New Chip Innovations
US and Russian Officials to Meet in Saudi Arabia Over Ending Ukraine Conflict. Ukraine and European leaders – who profit from this war – excluded from the negotiations.
Macron Calls for Urgent Summit as Ukraine Conflict Business Model is Threatened
Trump’s Defense Secretary: Ukraine Won’t Join NATO or Regain Lost Territories
Zelensky Urges Europe to Bolster Its Military in Light of Uncertain US Backing
Chinese Zoo Confesses to Dyeing Donkeys to Look Like Zebras
Elon Musk is Sherlock Holmes - Movie Trailer Parody featuring Donald Trump's Detective
Trump's Greenland Suggestion Sparks Sovereignty Discussions Amid Historical Grievances
OpenAI Board Dismisses Elon Musk's Offer to Acquire the Company.
USAID Uncovered: American Taxpayer Funds Leveraged to Erode Democracy in Europe Until Trump Put a Stop to It.
JD Vance and Scholz Did Not Come Together at the Munich Security Conference.
EU Official Participates in Discussions in Washington Amid Trade Strains
Qatar Contemplates Reducing French Investments Due to PSG Chief Investigation
Germany's Green Agenda Encounters Ambiguity Before Elections
Trump Did Not Notify Germany's Scholz About His Ukraine Peace Proposal.
Munich Car Attack Escalates Migration Discourse Before German Elections
NATO Allies Split on Trump's Proposal for 5% Defense Spending Increase
European Parliament Advocates for Encrypted Messaging to Ensure Secure Communications
Trump's Defense Spending Goal Creates Division Among NATO Partners
French Prime Minister Bayrou Navigates a Challenging Path Amid Budget Preservation and Immigration Discourse
Steering Through the Updated Hierarchy at the European Commission
Parliamentarian Calls for Preservation of AI Liability Directive
Mark Rutte Calls on NATO Allies to Increase Defence Expenditures
Dresden Marks the 80th Anniversary of the World War II Bombing.
Global Community Pledges to Aid Syria's Political Transition
EU Allocates €200 Billion for AI Investments, Introduces €20 Billion Fund for Gigafactories
EU Recognizes Its Inability to Close the USAID Funding Shortfall Due to Stalled US Aid
Commission President von der Leyen Missing from Notre Dame Reopening Due to Last-Minute Cancellation
EU Officializes Disinformation Code for Online Platforms, Omitting X
EU Fails to Fully Implement Key Cybersecurity Directives
EU Under Fire for Simplification Discussions Regarding Corporate Sustainability Reporting
Shein Encountering Further Information Request from the EU During Ongoing Investigation
European Commission Initiates Investigation into Shein as It Aims at Chinese E-Commerce Regulations
German Officials Respond to U.S. Proposal for Peace Talks with Russia
Senate Approves Robert F. Kennedy Jr. as Secretary of Health and Human Services.
Trump and Putin Engage in Discussions on Ukraine Peace Negotiations Amid Worldwide Responses
Honda and Nissan End Merger Talks
×