Aug. 17, 2022, 11:11 a.m. | Bruce Schneier

Security Boulevard securityboulevard.com

This vulnerability was reported to Zoom last December:



The exploit works by targeting the installer for the Zoom application, which needs to run with special user permissions in order to install or remove the main Zoom application from a computer. Though the installer requires a user to enter their password on first adding the application to the system, Wardle found that an auto-update function then continually ran in the background with superuser privileges.


When Zoom issued an update, the updater …

apple exploit exploits macos privilege escalation sbn news vulnerabilities zoom

Information Security Engineers

@ D. E. Shaw Research | New York City

Strategic Portfolio Leader - Communications and Electronic Warfare

@ Babcock | Bristol, GB, BS16 1EJ

Senior Security Analyst (GRC)

@ ASOS | London, United Kingdom

Ingénieur(e) Réseaux et Firewalling Cybersécurité - Toulouse

@ Sopra Steria | Colomiers, France

Security Lead - Malaysia

@ Control Risks | Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia

Cyber Security Engineer

@ Ecolab | IND-Bengaluru