A pair of security researchers have uncovered many 0day vulnerabilities in zoom τις τελευταίες ημέρες που θα επέτρεπαν στους hacker να αναλάβουν τον υπολογιστή κάποιου, ακόμη και αν το θύμα δεν κάνει κανένα click.
Zoom told Gizmodo that a server side update was released on Friday to address vulnerabilities and that users do not need to do anything.
The vulnerabilities were identified by Dutch researchers Daan Keuper and Thijs Alkemade from Computest Security, a security company, as part of the competition Pwn2Own 2021 organized by the initiative zero Day Initiative. Αν και δεν είναι γνωστές πολλές λεπτομέρειες για αυτές τις ευπάθειες λόγω της πολιτικής του διαγωνισμού, στην ουσία, οι ερευνητές χρησιμοποίησαν μια αλυσίδα τριών σφαλμάτων στην εφαρμογή Zoom για επιτραπέζιους υπολογιστές για να πραγματοποιήσουν μια απομακρυσμένη εκτέλεση κώδικα στο σύστημα προορισμού.
Ο user he must not click to make the attack successful. You can see the error below.
We're still confirming the details of the #Zoom exploit with Daan and Thijs, but here's a better gif of the bug in action. # Pwn2Own #PopCalc pic.twitter.com/nIdTwik9aW
- Zero Day Initiative (@thezdi) April 7, 2021
In one statement regarding Keuper and Alkemade's victory, Computest Security reported that the researchers were able to almost completely take over the targeted systems, performing actions such as activating cameraς, ενεργοποίηση του μικροφώνου, ανάγνωση email, έλεγχος της οθόνης και λήψη ιστορικού του προγράμματος browsing .
In case you forgot, the Zoom was not synonymous with security last year. There were Zoom Bombings that took advantage of Zoom's then loose control measures to drop porn clips and Nazi slogans in online sessions.