Comment: Zoom Client Leaks Windows Login Credentials To Attackers

The Zoom Windows client is vulnerable to UNC path injection in the client’s chat feature that could allow attackers to steal the Windows credentials of users who click on the link.

When using the Zoom client, meeting participants can communicate with each other by sending text messages through a chat interface.

When sending a chat message, any URLs that are sent are converted into hyperlinks so that other members can click on them to open a web page in their default browser, Bleeping Computer reported.

Subscribe
Notify of
guest

1 Expert Comment
Most Voted
Newest Oldest
Inline Feedbacks
View all comments
Tal Zamir
Tal Zamir , Founder and CTO
InfoSec Expert
April 2, 2020 7:03 pm

Especially in the current situation, enterprises must keep in mind that user devices use a variety of apps that go beyond just email and internet. Zoom is one of the most popular non-browser apps these days, and has new vulnerabilities enterprises should care about.

This includes the recently discovered Zoom Client vulnerability that allows a remote attacker on a Zoom call to receive a user\’s Windows credentials. Unfortunately, we\’ll see an increase of such attacks on collaboration tools such as Zoom, Teams, and Slack, as they all have a wide attack surface.

To really protect against endpoint threats in a comprehensive way, enterprises should adopt OS isolation techniques that move sensitive enterprise apps, data, and credentials into a separate OS that is isolated from riskier external-facing apps.

Last edited 2 years ago by Tal Zamir
Information Security Buzz
1
0
Would love your thoughts, please comment.x
()
x