Zoom Fixes Security Flaws in Mac That Could Have Allowed Hackers to Take Control of Victim's Machine

Zoom has a total of three security flaws were reported since December 2021.

Advertisement
By Sourabh Kulesh | Updated: 16 August 2022 13:33 IST
Highlights
  • Fix for first two flaws had another vulnerability
  • Hackers could have injected malicious software
  • Some pre-access was needed to infect machine

Security flaws were found in Zoom installer

Photo Credit: Twitter/ Zoom

Zoom has fixed vulnerabilities that could have allowed hackers to leverage the loophole and gain total control of a victim's machine. The issues were found and reported to Zoom in December 2021 but were shared at the DefCon security conference by Mac security researcher Patrick Wardle in Las Vegas last week. He said that he highlighted two issues in the automatic update feature of the video communication platform last year, which were fixed. However, the fix also brought in another vulnerability which Wardle shared onstage at the conference. Zoom has also plugged the third flaw.

As per multiple reports by The Verge and Wired, the first security flaw found by Wardle, who is a security researcher and founder of the Objective-See Foundation that creates open-source macOS security tools, was in the Zoom installer. The second one was in the tool that helped in confirming the cryptographic signatures needed to install updates. Zoom has patched the vulnerabilities and the patched version is now available for download.

But how did the vulnerability expose the users? The Zoom installer asks the users to punch in their credentials or cryptographic signatures as special permissions to remove or install the app. Once done, the Zoom app automatically downloads and installs security patches by checking the signature. The first vulnerability could have allowed an attacker to replace the signature that offers privileges, allowing the installer to install a malicious update, and exploit it.

Advertisement

The second vulnerability was found in a tool that facilitated the checking of cryptographic signatures. When the Zoom app is installed on a Mac machine, the system takes help of a standard macOS helper tool to confirm the signature and check whether the update that is being delivered is fresh — essentially restricting hackers to install an old, flawed version. Wardle found that a flaw could allow the hackers to trick the tool into accepting an old vulnerable version and taking total control of the victim's machine.

Advertisement

There was also a third vulnerability which Wardle found and discussed on stage last week. He said after patching the first two flaws, where Zoom now conducts its signature check securely and plugged the downgrade attack opportunity, there was still a third opportunity for hackers to exploit a loophole. He noticed that there is a moment after the signature verification and before the package is being installed on the system when attackers could inject their own malicious software into the Zoom update.

This malicious software can retain all the privileges and checks needed to install the update. An attacker could force the Zoom app user to reinstall the update in order to get multiple opportunities to insert a malicious patch and gain root access to the victim's device — just like Wardle did. However, the security researcher says that to exploit any of these flaws, a hacker should have some access to the victim's machine. Moreover, Zoom has also plugged the third flaw.


What should you make of Realme's three new offerings? We discuss them on Orbital, the Gadgets 360 podcast. Orbital is available on Spotify, Gaana, JioSaavn, Google Podcasts, Apple Podcasts, Amazon Music and wherever you get your podcasts.
Affiliate links may be automatically generated - see our ethics statement for details.
 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Further reading: Zoom, Cybersecurity, Apple, Mac
Advertisement

Related Stories

Popular Mobile Brands
  1. Redmi Pad 2 Pro 5G Will Launch in India Soon: See Expected Features
  2. OTT Releases of the Week: Thamma, Mrs Deshpande, Nayanam, and More
  3. Ethirneechal Thodargiradhu Now Streaming on SunNXT: What You Need to Know
  4. Infinix Xpad Edge With 13.2-Inch Display, 8,000mAh Battery Launched
  5. Nvidia's GeForce RTX 50 Series GPUs Are About to Be Scarce
  6. Samsung Will Unveil These New Bespoke AI Devices at CES 2026
  7. Samsung's 2nm Exynos 2600 Details Leak With 10-Core CPU and AMD GPU
  8. Eko OTT Release Reportedly Revealed: When and Where to Watch it Online?
  9. OnePlus 15s Visits BIS Certification Website; Could Launch in India Soon
  10. Xiaomi 17 Ultra With Leica-Tuned Cameras Confirmed to Launch Soon
  1. Adobe Firefly Platform Updated With New AI Models and Tools, Offers Limited-Time Unlimited Generations
  2. Boat Valour Ring 1 Launched in India With Heart Rate Variability Tracking, Up to 15-Day Battery Life: Price, Features
  3. Call of Duty: Black Ops 7 Was the Best-Selling Game in the US in November, but Trails Battlefield 6 in 2025
  4. Truecaller Voicemail Feature Launched for Android Users in India With Transcription in 12 Regional Languages
  5. OpenAI Starts Reviewing Third-Party App Submissions for ChatGPT Integration
  6. Google Brings Opal, an AI-Powered Mini App Builder Tool to Gemini
  7. Redmi Pad 2 Pro 5G India Launch Teased Soon After Global Debut: Expected Specifications, Features
  8. CES 2026: Samsung to Unveil Bespoke AI Laundry Combo, Jet Bot Steam Ultra Robot Vacuum, and More
  9. Samsung Exynos 2600 Details Leak Ahead of Galaxy S26 Launch; Could Be Equipped With 10-Core CPU, AMD GPU
  10. Vivo Y50e 5G, Vivo Y50s 5G Appear on Google Play Console; Mysterious Vivo Phone Listed on Certification Site
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2025. All rights reserved.