A pair of security researchers have uncovered many 0day vulnerabilities in Zoom in recent days that would allow hackers to take over someone's computer, even if the victim does not click.
Zoom told Gizmodo that a server side update was released on Friday to address vulnerabilities and that users do not need to do anything.
The vulnerabilities were identified by Dutch researchers Daan Keuper and Thijs Alkemade from Computest Security, a security company, as part of the competition Pwn2Own 2021 organized by the Zero Day Initiative. Although not many details about these vulnerabilities are known due to competition policy, the researchers actually used a three-tier error in the desktop Zoom application to perform remote code execution on the destination system.
The user does not have to click to succeed in the attack. You can see the error below.
We're still confirming the details of the #Zoom exploit with Daan and Thijs, but here's a better gif of the bug in action. # Pwn2Own #PopCalc pic.twitter.com/nIdTwik9aW
- Zero Day Initiative (@thezdi) April 7, 2021
In one statement regarding Keuper and Alkemade's victory, Computest Security reported that the researchers were able to almost completely take over the targeted systems, performing actions such as activating cameras, turn on the microphone, read email, check the screen and download program history tours.
In case you forgot, the Zoom was not synonymous with security last year. There were Zoom Bombings that took advantage of the then relaxed measures control of Zoom to throw porn clips and Nazi slogans at online sessions.