Zoom having Remote Control Execution (RCE) vulnerability?

During this pandemic, the new normal is working from home where we must attend meetings online at all time. One of the most used platforms will be Zoom. Zoom had their vulnerabilities and being patched from time to time.

There is a recent vulnerability in Zoom that can be exploited to hack Windows 7 machines running the video conferencing software. The flaw can lead to remote code execution(RCE), enabling an attacker to download and install malware onto a victim's Windows 7 PC. By executing RCE the attacker can elevate their privileges and take entire control of the victim’s machine.

This zero-day vulnerability in Zoom for Windows may be exploited by an attacker to execute arbitrary code on a victim’s computer. The attack doesn’t trigger a security warning and can be pulled off by getting the victim to perform a typical action such as opening a received document file.

The vulnerability was found by an unnamed researcher and reported to Acros Security, who reported it to Zoom. The flaw is only exploitable if the zoom client is installed on Windows 7 and older Windows systems, due to a specific system property. The flaw is likely also exploitable on Windows Server 2008 R2 and earlier.

Image retrieved from https://www.webroot.com/blog/2020/04/06/cyber-news-rundown-zoom-targeted-by-hackers/

 

 Zoom is working on to patch this vulnerability as soon as possible. Below is a screenshot is taken from zoom’s official page regarding this new vulnerability.

                

Image retrieved from https://support.zoom.us/hc/en-us/articles/201361953-New-updates-for-Windows

 

What can we do until Zoom patch it?

  • Temporarily stop using Zoom
  • Update Windows to a newer version
  • Implement the micro patch.

 

Also never forget to implement some safety measures when you are using zoom. Below are a few tips and tricks when using Zoom:

  1. Protect your account
  • Use a strong and unique password
  • Set two-factor authentication
  1. Use work e-mail to register Zoom
  2. Be aware of fake Zoom applications
  • use Zoom’s official website zoom.us
  1. Don’t use social media to share conference links, meeting ID and password.
  2. Protect every meeting with a password.
  3. Enable Waiting Room
  • Take control who can enter the meeting and can kick out the unwanted attendees

Add comment