A critical Zoom flaw can be used to hijack conference meetings

A serious vulnerability is affecting Zoom’s desktop conferencing application; if exploited it allows a remote hacker to hijack screen controls and kick attendees out of meetings.
The vulnerability which goes by the id of CVE-2018-15715 is a critical one and has a CVSS 3.0 score of 9.9.

The flaw happens thanks to a Zoom’s internal messaging pump, which is a mechanism Zoom uses fallow to wait for or send messages in the program.
Because the pump dispatches both client User Datagram Protocol and server Transmission Control Protocol messages to the same message handler, a hacker can easily craft and send a User Datagram Protocol (UDP) message; this crafted message is then interpreted as a trusted Transmission Control Protocol message used by authorized Zoom servers.

Once this happens a hacker could launch an array of malicious functions. That includes hijacking screen controls when a remote attendee shares a screen; spoofing chat messages impersonating other users on the conference; or kicking and locking out attendees from the conference.
Remember everything can be hacked. In order to stay away from any threats related to the cyber world, we recommend the install of antivirus for Windows or antivirus for Mac on every device that you own, depending on which OS your device is running. If you are a company, it is also recommended to hire every year a specialized cybersecurity company that will run annual tests on your company’s network. These tests include penetration testing and ethical hacking tests;

There are 750,000 businesses that use Zoom; just imagine the reputational impact of having something like this happen. Exploitation of this vulnerability could be extremely disruptive and poses as serious reputational risk.

Zoom is not the only one who is having cybersecurity problems, Cisco and Adobe have also had their fair share of video conferencing system flaws. Recently a critical vulnerability in the recording function of its WebEx conferencing platform has been patched; while earlier this year, Adobe worked to patch flaws in its conferencing software tool Adobe Connect.
This new critical flaw Impacts Zoom 4.1.33259.0925 for macOS and Windows 10, as well as Zoom 2.4.129780.0915 for Ubuntu and both one-on-one (P2P) meetings or group meetings that are streamed through Zoom servers.

For now, Zoom has patched its servers to block part of the attack vector. The company released fixed versions for Windows and macOS (4.1.34814.1119 to fix the vulnerability in Windows and version 4.1.34801.1116 for macOS), But the latest update for the Linux client doesn’t fix the issue and Zoom is reportedly working on an update.
Keep in mind that our modern society is dependent on computers, mobile devices, and the use of the internet always stay safe and secured.

We would continue to monitor the cybersecurity world. Meanwhile, users should keep a keen eye out for any cyber attacks. Remember to use an antivirus for Windows or antivirus for Mac in every device that you own, depending on which OS your machine is running, If you are a company we recommend to hire every year a specialized cybersecurity company that will run annual tests on your company’s network, tests like this include: penetration testing and ethical hacking.