‘Zero-Click’ Zoom Vulnerabilities Could Have Exposed Calls
Most hacks require the victim to click on the wrong link or open the wrong attachment. But as so-called zero-click vulnerabilities—in which the target does nothing at all—are exploited more and more, Natalie Silvanovich of Google’s Project Zero bug hunting team has worked to find new examples and get them fixed before attackers can use them. Her list now includes Zoom, which until recently had two alarming, interactionless flaws lurking inside.
Though fixed now, the two vulnerabilities could have been exploited without any user involvement to take over a victim’s device or even compromise a Zoom server that processes many users’ communications in addition to the original victim. Zoom users have the option to turn on end-to-end encryption for their calls on the platform, which would keep an attacker with that server access from surveilling their communications. But a hacker could still have used the access to intercept calls in which users didn’t enable that protection.
“This project took me months and I didn’t even get all the way there in terms of carrying out the full attack, so I think this would only be available to very well-funded attackers,” Silvanovich says. “But I wouldn’t be surprised if this is something that attackers are trying to do.”
Silvanovich has found zero-click vulnerabilities and other flaws in a number of communication platforms including Facebook Messenger, Signal, Apple’s FaceTime, Google Duo, and Apple’s iMessage. She says she had never given much thought to evaluating Zoom, because the company has added so many pop-up notifications and other protections over the years to ensure that users aren’t unintentionally joining calls. But she says she was inspired to investigate the platform after a pair of researchers demonstrated a Zoom zero-click at the 2021 Pwn2Own hacking competition in April.
Silvanovich, who originally disclosed her findings to Zoom at the beginning of October, says that the company was extremely responsive and supportive of her work. Zoom fixed the server-side flaw and released updates for users’ devices on December 1. The company has released a security bulletin and told WIRED that users should download the latest version of Zoom.
Most mainstream video conferencing services are based at least in part on open source standards, Silvanovich says, making it easier security researchers to vet them. But Apple’s FaceTime and Zoom are both fully proprietary, which makes it much harder to examine their inner workings and potentially find flaws.
“The barrier to doing this research on Zoom was quite high,” she says. “But I found serious bugs, and sometimes I wonder if part of the reason I found them and others didn’t is that huge barrier to entry.”
You likely join Zoom calls by receiving a link to a meeting and clicking it. But Silvanovich noticed that Zoom actually offers a much more expansive platform in which people can mutually agree to become “Zoom Contacts” and then message or call each other through Zoom the same way that you would call or text someone’s phone number. The two vulnerabilities Silvanovich found could only be exploited for interactionless attacks when two accounts have each other in their Zoom Contacts. This means that the prime targets for these attacks would be people who are active Zoom users, either individually or through their organizations, and are used to interacting with Zoom Contacts.
For all the latest Technology News Click Here
For the latest news and updates, follow us on Google News.