Zoom in/out fixes a critical vulnerability again after bypassing a pre-fix

Zoom / A serious vulnerability in Zoom for macOS, patched once last weekend, can still be bypassed, as of Wednesday. Users must update again.

Getty Images

It’s time for Zoom on Mac users to update again.

afterzoom Patch a vulnerability in the Mac auto-update tool Malicious actors could give root access earlier this week, video conferencing software company Another patch WednesdayNoting that the pre-fix can be bypassed.

Users should zoom in on macOS Download And running version 5.11.6 (9890), which was released on August 17th. You can also check Zoom’s menu bar for updates. Waiting for the automatic update can I’ll let you wait for days While this exploitation is known to the public.

An incomplete Zoom fix was reported by macOS security researcher Csaba Fitzl, aka the villain Offensive security. Zoom credited Fitzl with its security bulletin (ZSB-22019) and issued a correction the day before Fitzl tweeted about it.

Neither Fitzl nor Zoom explained how Fitzl managed to bypass the fix for the vulnerability First discovered by Patrick Wardlefounder of Foundation target see. Wardle

He spoke at Def Con last week About how Zoom’s auto-update tool retains its premium status for installing Zoom packages but can be tricked into checking other packages. This means that malicious actors can use it to downgrade Zoom to improve system access or even root the system.

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.