Zoom has issued a patch for a bug on macOS that might permit a hacker to take management of a person’s working system (via MacRumors). In an update on its security bulletin, Zoom acknowledges the difficulty (CVE-2022-28756) and says a repair is included in model 5.11.5 of the app on Mac, which you’ll (and may) obtain now.
Patrick Wardle, a safety researcher and founding father of the Goal-See Basis, a nonprofit that creates open-source macOS safety instruments, first uncovered the flaw and offered it on the Def Con hacking convention final week. My colleague, Corin Faife, attended the occasion and reported on Wardle’s findings.
As Corin explains, the exploit targets the Zoom installer, which requires particular person permissions to run. By leveraging this software, Wardle discovered that hackers might basically “trick” Zoom into putting in a trojan horse by placing Zoom’s cryptographic signature on the bundle. From right here, attackers can then achieve additional entry to a person’s system, letting them modify, delete, or add recordsdata on the system.
Reversing the patch, we see the Zoom installer now invokes lchown to replace the permissions of the replace .pkg, thus stopping malicious subversions pic.twitter.com/00xjqKQsXs
— patrick wardle (@patrickwardle) August 14, 2022
“Mahalos to Zoom for the (extremely) fast repair!” Wardle said in response to Zoom’s replace. “Reversing the patch, we see the Zoom installer now invokes lchown to replace the permissions of the replace .pkg, thus stopping malicious subversion.”
You’ll be able to set up the 5.11.5 replace on Zoom by first opening the app in your Mac and hitting zoom.us (this may be totally different relying on what nation you’re in) from the menu bar on the high of your display screen. Then, choose Test for updates, and if one’s accessible, Zoom will show a window with the newest app model, together with particulars about what’s altering. From right here, choose Replace to start the obtain.