![]() But if you give a file the same name as Zoom’s cryptographic signature, the software will run that file without asking any questions. This verifies that the update is authentic and published by the Zoom company. Normally, Zoom checks update packages for a cryptographic signature. The vulnerability extends from a bug in Zoom’s auto-update system. The vulnerability (CVE-2022-28756) received widespread coverage after it was demonstrated by Patrick Wardle, founder of the Objective-See Foundation, at a Def Con hacking conference on August 12th. This update comes just a week after Zoom revealed its privilege escalation vulnerability in a security bulletin. Here, you’ll be able to choose your desktop for screen sharing. This will open a new window on your screen. Once you’re in an active meeting, click on the Share Screen option from the bottom menu, as shown in the screenshot below. If you use Zoom on a Mac, update it today. Launch Zoom on your Mac and host or join a meeting. ![]() It seems that the company failed to completely patch Zoom’s privilege escalation vulnerability with the previous updates. Update, 8/22/22 9:51 am Eastern: Two days after this article was published, Zoom pushed an additional security update for macOS. If you use Zoom on your Mac, you should update the software now. ![]() But the latest Zoom update (5.11.5) patches this flaw. Older versions of Zoom could allow hackers to take over your macOS through a privilege escalation vulnerability. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |