![]() This initial report included a proposed description of a ‘quick fix’ Zoom could have implemented by simply changing their server logic. ![]() This vulnerability was originally responsibly disclosed on March 26, 2019. If you have updated Zoom to the latest version, you are now greeted with this new UI confirming you would actually like to join the meeting. The Zoom CEO has also assured us that they will be updating their application to further protect users privacy. UPDATE - July 9th (pm)Īccording to Zoom, they will have a fix shipped by midnight tonight pacific time removing the hidden web server hopefully this patches the most glaring parts of this vulnerability. Ringcentral for their web conference system is a white labeled Zoom system. Information Disclosure (Webcam) - Unfixed - CVE-2019–13450Īs far as I can tell this vulnerability also impacts Ringcentral.DOS Vulnerability - Fixed in Client version 4.4.2 - CVE-2019–13449. ![]() The flaw potentially exposes up to 750,000 companies around the world that use Zoom to conduct day-to-day business. ![]() A vulnerability in the Mac Zoom Client allows any malicious website to enable your camera without your permission. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |