A pair of security researchers have uncovered many 0day vulnerabilities in Zoom in recent days that would allow hackers to take over someone's computer, even if the victim does not click.
Zoom told Gizmodo that a server side update was released on Friday to address vulnerabilities and that users do not need to do anything.
The vulnerabilities were identified by Dutch researchers Daan Keuper and Thijs Alkemade from Computest Security, a security company, as part of the competition Pwn2Own 2021 organized by the Zero Day Initiative. Although not many details are known about these vulnerabilities due to the politics of the contest, in essence, the researchers used a chain of three bugs in Zoom application for desktops to perform a remote code execution on the destination system.
The user does not have to click to succeed in the attack. You can see the error below.
We're still confirming the details of the #Zoom exploit with Daan and Thijs, but here's a better gif of the bug in action. # Pwn2Own #PopCalc pic.twitter.com/nIdTwik9aW
- Zero Day Initiative (@thezdi) April 7, 2021
In one statement regarding Keuper and Alkemade's victory, Computest Security reported that the researchers were able to almost completely take over the targeted systems, performing actions such as activation of the camera, turn on the microphone, read email, control of the screen and download browser history.
In case you forgot, the Zoom it was not synonymous with safety last year. There were Zoom Bombings that took advantage of Zoom's then-lax controls to drop clips porn and Nazi slogans in online sessions.