Skip to main content

Flaw in Zoom Video Conferencing Software Lets Websites Hijack Mac Webcams


Zoom Video Conferencing Software
If you use Zoom video conferencing software on your Mac computer—then beware—any website you're visiting in your web browser can turn on your device camera without your permission.

Ironically, even if you had ever installed the Zoom client on your device and simply uninstalled it, a remote attacker can still activate your webcam.

Zoom is one of the most popular cloud-based meeting platforms that provide video, audio, and screen sharing options to users, allowing them to host webinars, teach online courses, conduct online training, or join virtual meetings online.

In a Medium post published today, cybersecurity researcher Jonathan Leitschuh disclosed details of an unpatched critical security vulnerability (CVE-2019-13450) in the Zoom client app for Apple Mac computers, which if combined with a separate flaw, could allow attackers to execute arbitrary code on the targeted systems remotely.

Jonathan responsibly reported the security vulnerability to the affected company over 90 days ago, but the Zoom team failed to offer a proper security patch, putting privacy and security of its over 4 million users at risk.

The vulnerability leverages the click-to-join feature of the popular conferencing software that has been designed to automatically activate Zoom app installed on the system, allowing participants to quickly join a video-meeting through their web browser as soon as they click on an invite link, for example, https://zoom.us/j/492468757.

Jonathan found that to offer this feature the Zoom software runs a local web server on the system—on port 19421—that "insecurely" receives commands through the HTTPS GET paraments and any website in your opened web browser can interact with it.

To exploit this vulnerability an attacker needs to do is create an invite link through his account on the Zoom website and embed it on a third-party website as an image tag or using an iFrame and just convenience the targets into visiting that website.

"Enabling 'Participants: On' when setting up a meeting, I discovered that anyone joining my meeting automatically had their video connected," Jonathan said.

As soon as Mac users with Zoom client installed on their system visits the malicious website, it will forcefully launch the Zoom app and turn on their webcam, exposing them to attackers.

"This could be embedded in malicious ads, or it could be used as a part of a phishing campaign. If I were actually an attacker, I'd probably invest some time to also include the incrementing port logic that the code in the Javascript running on Zoom's site," Jonathan said.

Simply uninstalling the software is not enough to get rid of this problem as Jonathan explained the click-to-join feature also accepts a command that automatically reinstalls Zoom without users' intervention or permission.
Besides turning on the webcam, the vulnerability can also be abused to DoS attack the targeted Mac computer by simply sending a large number of repeated GET requests to the local server.

"Zoom did end up patching this vulnerability, but all they did was prevent the attacker from turning on the user's video camera," Jonathan said. "They did not disable the ability for an attacker to forcibly join a call anyone visiting a malicious site."

The vulnerability affects the latest version 4.4.4 of Zoom app for Mac.

In addition to Zoom, Jonathan also disclosed the vulnerability to both the Chromium and Mozilla teams, but since the issue does not actually reside in their web browsers, there's not much these companies can do.

However, the good news is that users can still fix this issue at their ends. All you need to do is manually disable the setting that allows Zoom to automatically turn your webcam on when joining a meeting.

For this, just go into the Zoom settings window and enable the "Turn off my video when joining a meeting" setting.

You can also run a series of Terminal commands, which you can find at the bottom of Jonathan's post, to uninstall the web server completely.

Zoom Responded to the Researcher's Findings


In a statement published later today, the company has acknowledged the issue but also added that "because the Zoom client user interface runs in the foreground upon launch, it would be readily apparent to the user that they had unintentionally joined a meeting and they could change their video settings or leave immediately."

Besides this, the company said they have "no indication" if the reported issues had been exploited to breach the privacy of any of their users.

Zoom also acknowledged other related concerns over its software and said the local denial of service (DOS) vulnerability reported by the researcher has already been fixed in May 2019, though the company said it did not force its users to update because it is "empirically a low-risk vulnerability."

The company also said it installs a limited-functionality web server when users install Zoom client to offer one-click-to-join meetings feature that could avoid users' extra click before joining every meeting, but it did not comment on why the server remains installed on the local machine even when a user chooses to uninstall the client software.

Comments

Popular posts from this blog

Applications and Threats Content Release Notes

  Threat Intelligence Report Top Attacks and Breaches The biochemical systems at an Oxford university research lab currently studying the Covid-19 pandemic has been  breached . Clinical research was not affected by the incident. Breached systems include machines used to prepare biochemical samples, and hackers are currently attempting to  sell  their access to those machines. Twitter has permanently  suspended  multiple accounts found to be part of four disinformation campaign networks, most likely operated by state-sponsored actors associated with Iran, Russia and Armenia. The Iranian infrastructure was previously used to disrupt the 2020 US presidential campaign discourse. Gmail accounts of global pro-Tibet organizations have been  targeted  by the Chinese APT TA413, an espionage group known for its operations against civil dissidents. The campaign leverages a customized malicious Mozilla Firefox browser extension to gain control over the victim...

Cisco Releases Security Updates for Cisco ASA 5506-X, 5508-X, 5516-X and Firepower// Cisco Bug IDs: CSCvp36425

A vulnerability in the cryptographic driver for Cisco Adaptive Security Appliance Software (ASA) and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the device to reboot unexpectedly. The vulnerability is due to incomplete input validation of a Secure Sockets Layer (SSL) or Transport Layer Security (TLS) ingress packet header. An attacker could exploit this vulnerability by sending a crafted TLS/SSL packet to an interface on the targeted device. An exploit could allow the attacker to cause the device to reload, which will result in a denial of service (DoS) condition. Note:  Only traffic directed to the affected system can be used to exploit this vulnerability. This vulnerability affects systems configured in routed and transparent firewall mode and in single or multiple context mode. This vulnerability can be triggered by IPv4 and IPv6 traffic. A valid SSL or TLS session is required to exploit this vulnerability. Cisco has...

Site-to-site IPsec VPN with two FortiGates

In this example, you will allow transparent communication between two networks that are located behind different FortiGates at different offices using route-based IPsec VPN. The VPN will be created on both FortiGates by using the VPN Wizard's   Site to Site - FortiGate   template. In this example, one office will be referred to as HQ and the other will be referred to as Branch. 1. Configuring the HQ IPsec VPN On the HQ FortiGate, go to  VPN > IPsec Wizard . Select the  Site to Site  template, and select  FortiGate . In the  Authentication  step, set  IP Address  to the IP of the Branch FortiGate (in the example,  172.20.120.135 ). After you enter the gateway, an available interface will be assigned as the  Outgoing Interface . If you wish to use a different interface, select it from the drop-down menu. Set a secure  Pre-shared Key . In the  Policy & Routing  step, set the  Loca...