Posted on 07/09/2019 9:35:01 AM PDT by BenLurkin
Today, security researcher Jonathan Leitschuh ...demonstrated that any website can open up a video-enabled call on a Mac with the Zoom app installed. Thats possible in part because the Zoom app apparently installs a web server on Macs that accepts requests regular browsers wouldnt. In fact, if you uninstall Zoom, that web server persists and can reinstall Zoom without your intervention.
clicking a link if you have previously installed the Zoom app (and havent checked a certain checkbox in settings) will auto-join you to a conference call with your camera on.
Leitschuh details how he responsibly disclosed the vulnerability to Zoom back in late March, giving the company 90 days to solve the problem. According to Leitschuhs account, Zoom doesnt appear to have done enough to resolve the issue. The vulnerability was also disclosed to both the Chromium and Mozilla teams, but since its not an issue with their browsers, theres not much those developers can do.
Turning on your camera is bad enough, but the existence of the web server on their computers could open up more significant problems for Mac users. For example, in an older version of Zoom (since patched), it was possible to enact a denial of service attack on Macs by constantly pinging the web server: By simply sending repeated GET requests for a bad number, Zoom app would constantly request focus from the OS, Leitschuh writes.
(Excerpt) Read more at theverge.com ...
Possible interest ping
Zoom? Have a juice box.
Yeah a my company switched to this last year and were scrambling to disable the servers.
The picture of Zuckerburg with his computer camera taped over shows how much we can trust any camera that can be linked to the internet.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.