• Tech News
  • Fintech
  • Startup
  • Games
  • Ar & Vr
  • Reviews
  • How To
  • More
    • Mobile Tech
    • Pc & Laptop
    • Security
What's Hot

12 Simple Tweaks to Make Your MacBook’s Battery Last All Day

November 26, 2025

How to Fix Battery Drain, Lag, and Overheating

November 26, 2025

Is Your iPhone Leaking Data? Here’s How to Check Your ‘Browser Fingerprint’

November 25, 2025
Facebook Twitter Instagram
  • Contact
  • Privacy Policy
  • Terms & Conditions
Facebook Twitter Instagram Pinterest VKontakte
Behind The ScreenBehind The Screen
  • Tech News
  • Fintech
  • Startup
  • Games
  • Ar & Vr
  • Reviews
  • How To
  • More
    • Mobile Tech
    • Pc & Laptop
    • Security
Behind The ScreenBehind The Screen
Home»Security»The Zoom installer let a researcher hack his way to root access on macOS
Security

The Zoom installer let a researcher hack his way to root access on macOS

August 12, 2022No Comments4 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
The Zoom installer let a researcher hack his way to root access on macOS
Share
Facebook Twitter LinkedIn Pinterest Email

A safety researcher has discovered a manner that an attacker might leverage the macOS model of Zoom to achieve entry over the whole working system.

Particulars of the exploit had been launched in a presentation given by Mac safety specialist Patrick Wardle on the Def Con hacking convention in Las Vegas on Friday. A few of the bugs concerned have already been mounted by Zoom, however the researcher additionally offered one unpatched vulnerability that also impacts methods now.

The exploit works by focusing on the installer for the Zoom software, which must run with particular person permissions with a purpose to set up or take away the principle Zoom software from a pc. Although the installer requires a person to enter their password on first including the applying to the system, Wardle discovered that an auto-update operate then frequently ran within the background with superuser privileges.

A privilege escalation assault

When Zoom issued an replace, the updater operate would set up the brand new bundle after checking that it had been cryptographically signed by Zoom. However a bug in how the checking methodology was carried out meant that giving the updater any file with the identical identify as Zoom’s signing certificates can be sufficient to cross the check — so an attacker might substitute any sort of malware program and have or not it’s run by the updater with elevated privilege.

The result’s a privilege escalation attack, which assumes an attacker has already gained preliminary entry to the goal system after which employs an exploit to achieve a better stage of entry. On this case, the attacker begins with a restricted person account however escalates into probably the most highly effective person kind — generally known as a “superuser” or “root” — permitting them so as to add, take away, or modify any recordsdata on the machine.

See also  Google’s open-source bug bounty aims to clamp down on supply chain attacks

Wardle is the founding father of the Goal-See Basis, a nonprofit that creates open-source safety instruments for macOS. Beforehand, on the Black Hat cybersecurity convention held in the identical week as Def Con, Wardle detailed the unauthorized use of algorithms lifted from his open-source safety software program by for-profit corporations.

“It was actually irritating to attend … six, seven, eight months”

Following accountable disclosure protocols, Wardle knowledgeable Zoom in regards to the vulnerability in December of final yr. To his frustration, he says an preliminary repair from Zoom contained one other bug that meant the vulnerability was nonetheless exploitable in a barely extra roundabout manner, so he disclosed this second bug to Zoom and waited eight months earlier than publishing the analysis.

“To me that was sort of problematic as a result of not solely did I report the bugs to Zoom, I additionally reported errors and easy methods to repair the code,” Wardle advised The Verge in a name earlier than the discuss. “So it was actually irritating to attend, what, six, seven, eight months, realizing that each one Mac variations of Zoom had been sitting on customers’ computer systems susceptible.”

A couple of weeks earlier than the Def Con occasion, Wardle says Zoom issued a patch that mounted the bugs that he had initially found. However on nearer evaluation, one other small error meant the bug was nonetheless exploitable.

Within the new model of the replace installer, a bundle to be put in is first moved to a listing owned by the “root” person. Usually which means that no person that doesn’t have root permission is ready to add, take away, or modify recordsdata on this listing. However due to a subtlety of Unix methods (of which macOS is one), when an present file is moved from one other location to the basis listing, it retains the identical read-write permissions it beforehand had. So, on this case, it could actually nonetheless be modified by a daily person. And since it may be modified, a malicious person can nonetheless swap the contents of that file with a file of their very own selecting and use it to turn into root.

See also  Nomadic city builder The Wandering Village hits early access in September

Whereas this bug is presently reside in Zoom, Wardle says it’s very straightforward to repair and that he hopes that speaking about it publicly will “grease the wheels” to have the corporate maintain it sooner reasonably than later.

Zoom had not responded to a request for remark at time of publication.

Source link

access hack installer macOS researcher root Zoom
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Latest macOS Tahoe 26 Beta Contains Info About Sealed-Box Mac Updates at Apple Stores

July 10, 2025

Apple Drops macOS Tahoe 26 Beta 3 a Day Late

July 10, 2025

macOS Tahoe Doesn’t Like Oddly Shaped App Icons (But You Can Get Them Back)

June 25, 2025

Apple Releases Second Dev Betas of iOS 26, macOS Tahoe, and More

June 24, 2025
Add A Comment

Comments are closed.

Editors Picks

Personal Siri Still Won’t Arrive Until Spring 2026

June 16, 2025

New Singapore digital bank Trust selects Thought Machine core

November 30, 2022

Why Your iPhone Is Overheating (and How to Cool It Down Safely)

September 29, 2025

AirPods Pro 3 May Be Key to Reigniting Apple’s Sales Growth

July 17, 2025

Subscribe to Updates

Get the latest news and Updates from Behind The Scene about Tech, Startup and more.

Top Post

12 Simple Tweaks to Make Your MacBook’s Battery Last All Day

How to Fix Battery Drain, Lag, and Overheating

Is Your iPhone Leaking Data? Here’s How to Check Your ‘Browser Fingerprint’

Behind The Screen
Facebook Twitter Instagram Pinterest Vimeo YouTube
  • Contact
  • Privacy Policy
  • Terms & Conditions
© 2025 behindthescreen.fr - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.