Zoom suggests its major spying security flaw is worth it for “faster, one-click-to-join meetings”

Not only is the flaw present in the software, but even after you uninstall it using the conventional methods, a vulnerability remains.

JOIN 12,000+ OTHERS:
Defend free speech. Push back against gatekeepers. Grow and monetize online. Subscribe for free.

A security researcher exposed a vulnerability that allows any malicious webpage to open-up a video call to a Mac device with the Zoom app installed, without asking for any permission.

According to Jonathan Leitschuh, the researcher, the flaw potentially exposes up to 750,000 companies worldwide that are using Zoom on a daily basis to conduct their business.

A drastic solution would be just to uninstall Zoom from the computer, meaning the user is no longer at risk of being secretly watched by someone. However, as Leitschuh explains, Zoom’s initial installation also retrofits a web server on the computer. Even once Zoom has been uninstalled, the web server code keeps running in a hidden directory – waiting for the user to visit a Zoom meeting link to then reinstall the app without asking for the user’s permission.

The archetypal Mac user is well accustomed to thinking that an app is uninstalled by click-dragging it into the trashbin, without leaving behind any traces of code that can take autonomous decisions, such as reinstalling an app, without explicit approval.

Double your web browsing speed with today's sponsor. Get Brave.

But this is exactly what Zoom does.

Allegedly, Zoom is installing its web server to manage updates and aid in the launching of calls, but Leitschuh underlined his nervousness about this approach:

“In my opinion, websites should not be talking to Desktop applications like this. There is a fundamental sandbox that browsers are supposed to enforce to prevent malicious code from being executed on users machines,” he said.

“Having every Zoom user have a web server that accepts HTTP GET requests that trigger code outside of the browser sandbox is painting a huge target on the back of Zoom.”

Zoom thinks the installation of its server code can be justified because “it’s a “legitimate solution to a poor user experience problem, enabling our users to have faster, one-click-to-join meetings.”

Leitschuh explained how he revealed the vulnerability to Zoom this March, detailing how Mac users could be victims of DDoS attacks that saturate the server with pings. The researched told Zoom to fix the issue within 90 days or he would go public.

After a lot of correspondence, the DDoS vulnerability issue was fixed with the 4.4.2 update of the Zoom app. But Zoom’s response to other concerns was not thorough as the patch only disabled “a meeting creator’s ability to enable participant video by default.”

As Leitschuh points out, the fix for this vulnerability “regressed” at the beginning of June, allowing for the camera to be activated and exploited.

Filippo Cestaro
Filippo Cestaro is a tech news writer with a strong focus on AI, machine learning, and big data. His interests include AI singularity and transhumanism. He is also a contributor to Scuba Zone Magazine and joined with the University of Milan to publish work on the psychology of scuba diving. [email protected]