The flaw could be used to control the webcam of a user when visiting a specially crafted website. The expert also discovered that is possible to control the webcam even if the user has uni
This is possible because the client installs a local web server on the system that is not removed when the software is uninstalled. The software will happily re-install the Zoom client without requiring any user interaction on user behalf besides visiting a webpage.
Zoom is the leader in enterprise video communications, it is one of the most popular and reliable cloud platform for video and audio conferencing, chat, and webinars.
“A vulnerability in the Mac Zoom Client allows any malicious website to enable your camera without your permission. The flaw potentially exposes up to 750,000 companies around the world that use Zoom to conduct
According to Leitschuh over 4 million users are at risk.
The flaw leverages the click-to-join feature of the Zoom software that allows to automatically activate the app installed on the system to join a video-meeting through their web browser with a simple click on an invite link
An example of invite link is:
The implementation of this feature leverages a local web server listening on port 19421 that could receive without necessary authorization commands through the HTTPS GET paraments. It also allows any website opened in the users’ web browsers to interact with it.
“On Mac, if you have ever installed Zoom, there is a web server on your local machine running on port 19421. You can confirm this server is present by running lsof -i :19421 in your terminal.” explained the expert.
“First off, let me start off by saying having an installed app that is running a web server on my local machine with a totally undocumented API feels incredibly sketchy to me. Secondly, the fact that any website that I visit can interact with this web server running on my machine is a huge red flag for me as a Security Researcher.”
The expert created a personal meeting with a different account analyzed the parameters used in the GET request used to automatically launch a Zoom meeting when clicking on the invite link.
Only the following links seem to be important:
All the attacker need to do is to create an invite link through his account on the Zoom website and embed it on a website as an image tag or using an iFrame. Then he needs to trick the victims into visiting the malicious website.
“Enabling “Participants: On” when setting up a meeting, I discovered that anyone joining my meeting automatically had their video connected.
When I got back to my personal machine, I tried this same functionality and found that it worked exactly the same.” Jonathan explained.
When Mac users using Zoom client visits the specially crafted website, Zoom app will be launched and turn on the webcam.
The link could be spread through malspam campaign or distributed via phishing messages.
The expert explained that the flaw can also be abused to trigger a DoS condition by sending a large number of repeated GET requests to the local server.
“Zoom did end up patching this vulnerability, but all they did was prevent the attacker from turning on the user’s video camera,” Jonathan said. “They did not disable the ability for an attacker to forcibly join a call anyone visiting a malicious site.”
The flaw affects the version 4.4.4 of Zoom app for Mac.
Jonathan also spoke about the vulnerability with both Chromium and Mozilla dev teams, but they explained that cannot do anything because the issue doesn’t reside in their web browsers.
To mitigate the flaw, users can manually disable the setting that allows Zoom to automatically turn on the webcam when joining a meeting.
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.