10 April,2021 10:50 AM IST | San Francisco | IANS
Pic/iStock
Security researchers have discovered a zero-day vulnerability in video conferencing platform Zoom which can be used by cybercriminals to launch remote code execution (RCE) attacks. The vulnerability was discovered as part of a contest, Pwn2Own, organised by cybersecurity firm Trend Micro's Zero Day Initiative (ZDI), a programme designed to reward security researchers for responsibly disclosing vulnerabilities.
The researchers from the Netherlands-based Computest won $200,000 for the discovery. "Confirmed! The duo of Daan Keuper and Thijs Alkemade from Computest used a 3-bug chain to exploit #Zoom messenger with 0 clicks from the target. They win $200,000 and 20 points towards Master of Pwn. #Pwn2Own," Zero Day Initiative tweeted on Thursday.
The competition included 23 separate entries, targeting 10 different products in the categories of web browsers, virtualisation, servers, local escalation of privilege, and enterprise communications. The specific technical details of the vulnerability have not been made public as Zoom has not yet had time to patch the security issue, ZDNet reported.
In vulnerability disclosure programmes, it is a standard practice to offer vendors a 90-day window to fix a newly discovered security issue. As noted by Malwarebytes, the attack works on the Windows and Mac version of the Zoom software, but it does not affect the browser version. It is not not clear whether the iOS- and Android-apps are vulnerable since Keuper and Alkemade did not look into those, according to the report.
ALSO READ
NAPA writes to EAM seeking air link between San Francisco and Amritsar
Air India to cancel around 60 flights on India-US routes in Nov-Dec
Mumbai airport conducts bomb drills due to surge in threats
Air India de-rosters three cabin crew members for lapse in opening aircraft door
Tamil Nadu govt inks pact with Microchip, Nokia, PayPal during CM’s visit to San Francisco
While thanking the Computest researchers, Zoom, in a statement to Tom's Guide, said the company was "working to mitigate this issue with respect to Zoom Chat, our group messaging product. In-session chat in Zoom Meetings and Zoom Video Webinars are not impacted by the issue".
This story has been sourced from a third party syndicated feed, agencies. Mid-day accepts no responsibility or liability for its dependability, trustworthiness, reliability and data of the text. Mid-day management/mid-day.com reserves the sole right to alter, delete or remove (without notice) the content in its absolute discretion for any reason whatsoever