It is time for Zoom customers on Mac to replace—once more.
After Zoom patched a vulnerability in its Mac auto-update utility that might give malicious actors root entry earlier this week, the video conferencing software program firm issued another patch Wednesday, noting that the prior repair may very well be bypassed.
Zoom customers on macOS ought to download and run model 5.11.6 (9890), launched August 17. It’s also possible to test Zoom’s menu bar for updates. Ready for an computerized replace may leave you waiting days whereas this exploit is publicly recognized.
Zoom’s incomplete repair was reported by macOS safety researcher Csaba Fitzl, aka theevilbit of Offensive Safety. Zoom credited Fitzl in its safety bulletin (ZSB-22019) and issued a patch the day earlier than Fitzl tweeted about it.
Neither Fitzl nor Zoom detailed how Fitzl was capable of bypass the repair for the vulnerability first discovered by Patrick Wardle, founding father of the Objective-See Foundation. Wardle spoke at Def Con last week about how Zoom’s auto-update utility held onto its privileged standing to put in Zoom packages however may very well be tricked into verifying different packages. That meant malicious actors may use it to downgrade Zoom for higher exploit entry and even to achieve root entry to the system.
Leave a Reply