Friday, March 29, 2024

Zoom Flaws Can Be Exploited By Hackers by Sending Specially Crafted Messages

Four critical security vulnerabilities have been fixed recently in the popular video conferencing service Zoom. These security flaws could be exploited by the threat actors to send specially crafted XMPP messages to another user and then run malicious code on that server using the compromised user’s computer.

The vulnerabilities that are addressed recently range from 5.9 to 8.1 on the severity scale. All four security flaws were discovered and reported in February 2022 by Ivan Fratric of Google Project Zero.

Bugs Detected & Fixed

It should be noted that the company now addressed the following vulnerabilities:-

  1. CVE ID: CVE-2022-22784
  2. Description: Improper XML Parsing in Zoom Client for Meetings
  3. CVSS score: 8.1
  4. Severity: High
  1. CVE ID: CVE-2022-22785
  2. Description: Improperly constrained session cookies in Zoom Client for Meetings
  3. CVSS score: 5.9
  4. Severity: Medium
  1. CVE ID: CVE-2022-22786
  2. Description: Update package downgrade in Zoom Client for Meetings for Windows
  3. CVSS score: 7.5
  4. Severity: High
  1. CVE ID: CVE-2022-22787
  2. Description: Insufficient hostname validation during server switch in Zoom Client for Meetings
  3. CVSS score: 5.9
  4. Severity: Medium

Exploitation

Among all of them, CVE-2022-22784 with a CVSS score of 8.1 is the most severe flaw fixed by Zoom. This vulnerability is related to improper XML parsing in the Zoom Client for Meetings.

In the exploitation of the vulnerability, the threat actor is able to create a distinct message context and break away from the current XMPP message context. In this way, different actions are performed by the user’s client on the receiving end.

Zoom’s chat feature is built upon the XMPP standard and therefore enables a high level of interaction. As a result of exploiting the aforementioned vulnerabilities, the threat actors can pose as regular users to steal sensitive information. 

This will result in arbitrary code execution due to the downgrade attack caused by a suspicious server. XML parsers in the software’s client and server can be found to have inconsistencies by cyberattackers.

The victim of such an attack will receive XMPP stanzas which can be used to communicate with the attackers.

A Zoom client with a less secure version of the software can be served up via a man-in-the-middle server that hijacks the software update mechanism.

In a nutshell, Zoom is releasing patches to fix two high-severity flaws, CVE-2022-22782 and CVE-2022-22783 which were found approximately one month ago. 

The vulnerabilities could lead to escalation of privileges within the on-premise Meetings service and disclosure of memory contents, both of which could lead to local privilege escalation. 

Zoom’s macOS app was also victimized by a downgrade attack (CVE-2022-22781) which was also fixed. To mitigate any potential threat arising out of active exploitation of the vulnerability, it is recommended that all users of the application update to the latest version (5.10.0) of the app.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.

Website

Latest articles

Google Revealed Kernel Address Sanitizer To Harden Android Firmware And Beyond

Android devices are popular among hackers due to the platform’s extensive acceptance and open-source...

Compromised SaaS Supply Chain Apps: 97% of Organizations at Risk of Cyber Attacks

Businesses increasingly rely on Software as a Service (SaaS) applications to drive efficiency, innovation,...

IT and security Leaders Feel Ill-Equipped to Handle Emerging Threats: New Survey

A comprehensive survey conducted by Keeper Security, in partnership with TrendCandy Research, has shed...

How to Analyse .NET Malware? – Reverse Engineering Snake Keylogger

Utilizing sandbox analysis for behavioral, network, and process examination provides a foundation for reverse...

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus Labs, the leading Web3 security infrastructure provider, has unveiled a groundbreaking report highlighting...

Wireshark 4.2.4 Released: What’s New!

Wireshark stands as the undisputed leader, offering unparalleled tools for troubleshooting, analysis, development, and...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles