{"id":15733,"date":"2019-07-09T10:45:03","date_gmt":"2019-07-09T18:45:03","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2019\/07\/09\/news-9480\/"},"modified":"2019-07-09T10:45:03","modified_gmt":"2019-07-09T18:45:03","slug":"news-9480","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/07\/09\/news-9480\/","title":{"rendered":"A Zoom Flaw Gives Hackers Easy Access to Your Webcam"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5d24d6cfc463480009014514\/master\/pass\/security_zoom_19108463913007.jpg\"\/><\/p>\n<p><strong>Credit to Author: Lily Hay Newman| Date: Tue, 09 Jul 2019 15:18:30 +0000<\/strong><\/p>\n<p><span class=\"lede\">Zoom has gained <\/span>devotees\u2014and a post-IPO boom\u2014thanks to its <a href=\"https:\/\/www.wired.com\/2017\/03\/silicon-valleys-plot-reinvent-dreaded-conference-call\/\">dead-simple video conferencing tech<\/a>. Joining a call is particularly easy; with the click of a meeting URL, the page automatically launches the desktop app, and you&#x27;re in. But as security researcher Jonathan Leitschuh discovered, that seamlessness comes with a striking set of vulnerabilities for Zoom users on Apple computers\u2014including one that could let an attacker hijack your webcam.<\/p>\n<p>On Monday, Leitschuh <a href=\"https:\/\/medium.com\/@jonathan.leitschuh\/zoom-zero-day-4-million-webcams-maybe-an-rce-just-get-them-to-visit-your-website-ac75c83f4ef5\" target=\"_blank\">publicly disclosed<\/a> details of how an attacker could set up a malicious call, trick users into clicking a link to join it, and instantly add their video feed, letting them look into a victim&#x27;s room, office, or wherever their webcam is pointing. In addition, Leitschuh found that attackers could also launch a denial of service attack against Macs by using the same mechanism to overwhelm them with join requests.<\/p>\n<p class=\"paywall\">Zoom patched this DoS issue in a May update but for now is only adjusting its auto-join video settings, giving users a more prominent way of choosing whether their video feed automatically launches when they click a Zoom call link. Leitschuh says the new fix is not enough to address user privacy concerns or the underlying insecurity of the flow that allows Zoom to launch calls from meeting URLs so smoothly.<\/p>\n<p class=\"paywall\">\u201cWithout the user giving any explicit consent nor taking any explicit action, they would be instantly dropped into a Zoom meeting,\u201d Leitschuh says of a malicious Zoom call attack. &quot;By default, Zoom shows video but doesn&#x27;t send audio, though both settings are changeable. So depending on their video and audio settings, victims would potentially be immediately broadcasting themselves, perhaps even without their knowledge if they&#x27;re not looking at their screen.&quot;<\/p>\n<p class=\"paywall\">To demonstrate the severity of the vulnerability, Leitschuh published some proof-of-concept attack links; click on them and you&#x27;ll automatically join a call. Since Zoom hasn&#x27;t issued the update meant to address this yet, the demo still very much works.<\/p>\n<p class=\"paywall\">The vulnerability stems from a conscious choice on Zoom&#x27;s part. To reduce friction from the video chat experience, Zoom sets up a local web server on every user\u2019s Mac that allows call URLs to automatically launch the desktop app. Zoom says that this setup is in place as a \u201cworkaround\u201d to a feature of Safari 12 that would require users to approve Zoom launching every time they click a call link. And though the workaround is there to deal with a Safari feature, the same setup applies no matter which browser you launch a Zoom link from. Zoom doesn&#x27;t offer quite such a frictionless experience on Windows, but there&#x27;s a box you can check to permanently dismiss the prompts and start video automatically, which would put you in a similar situation.<\/p>\n<p class=\"paywall\">\u201cThe local web server enables users to avoid this extra click before joining every meeting. We feel that this is a legitimate solution to a poor user-experience problem,\u201d Zoom said in a <a href=\"https:\/\/blog.zoom.us\/wordpress\/2019\/07\/08\/response-to-video-on-concern\/\" target=\"_blank\">statement<\/a> late Monday night. \u201cWe are not alone among video conferencing providers in implementing this solution.\u201d<\/p>\n<p>&quot;This is a very disturbing set of bugs, but unsurprising given other Zoom issues.&quot;<\/p>\n<p name=\"inset-left\" class=\"inset-left-component__el\">Thomas Reed, Malwarebytes<\/p>\n<p class=\"paywall\">The Safari feature does add an extra step for users. But by circumventing that step, Zoom potentially exposes its users to strangers ogling them online\u2014which demonstrates the need for that extra layer of permission in the first place. Additionally, Leitschuh points out that Zoom\u2019s local web server persists on your Mac even if you uninstall the Zoom desktop app. If you ever click a Zoom call link again, the program can quickly download and reinstall itself automatically through the web server.<\/p>\n<p class=\"paywall\">\u201cHaving an installed app that is running a web server on my local machine with a totally undocumented API feels incredibly sketchy to me,\u201d Leitschuh wrote in his report, noting that he combed the web for details about Zoom\u2019s application programming interface for this feature and couldn\u2019t find anything. \u201cThe fact that any website that I visit can interact with this web server running on my machine is a huge red flag for me.\u201d<\/p>\n<p class=\"paywall\">Zoom has added a cryptographic signing mechanism for requests made to the local web servers, which is an authentication improvement, but Leitschuh has already proposed a way that an attacker could bypass the protection.<\/p>\n<p class=\"paywall\">&quot;This is a very disturbing set of bugs, but unsurprising given other Zoom issues I\u2019ve observed and reported in the past. The local web server is honestly the most concerning part, and it&#x27;s not fixed,&quot; says Thomas Reed, a Mac research specialist at the security firm Malwarebytes. &quot;The web server is concerning because of the possibility that someone could find a way to use it remotely to trigger remote code execution.&quot;<\/p>\n<p class=\"paywall\">As Leitschuh points out, researchers at the security exposure assessment firm Tenable <a href=\"https:\/\/www.tenable.com\/blog\/tenable-research-advisory-zoom-unauthorized-command-execution-cve-2018-15715\" target=\"_blank\">recently discovered<\/a> such a remote code-execution bug in Zoom that could have been combined with these new findings to attack not just Zoom but a user&#x27;s broader Mac system. Zoom has patched the Tenable vulnerability.<\/p>\n<p class=\"paywall\">&quot;This Zoom vulnerability is especially concerning and downright creepy because it doesn&#x27;t require a user to be on a Zoom call,&quot; says Tenable&#x27;s David Wells. &quot;The Zoom flaw I found last year would allow an attacker to invoke keystrokes on remote machines, even without being a meeting attendee. Combining both vulnerabilities in a targeted attack would be extremely dangerous.&quot;<\/p>\n<p class=\"paywall\">And Zoom won&#x27;t fully issue a patch here. Instead, to address the auto-join-video-feeds feature, Zoom is adding a tweak in an upcoming update that will use the setting people choose in their first-ever Zoom call as the default for future calls. If you decide in your first call that you want to manually add video each time, that will be the default for every call thereafter. In the current version of Zoom, you can add similar protection for yourself by going to <strong>Settings\/Preferences &gt; Video &gt;  Meetings &gt; Turn off my video when joining a meeting<\/strong>.<\/p>\n<p class=\"paywall\">Leitschuh told Zoom on March 26 that the company had 90 days\u2014a standard deadline in information security\u2014to fix the issues. He declined to join Zoom\u2019s private bug-bounty program because of its nondisclosure-agreement requirements. Zoom now says it is going to launch a public bug bounty in the next few weeks. \u201cWe acknowledge that our website currently doesn\u2019t provide clear information for reporting security concerns,\u201d the company says.<\/p>\n<p class=\"paywall\">For now, make sure your Zoom is up to date, and change your video settings to block auto-joining. The situation is an important reminder, though, that given the choice between protecting security and privacy or prioritizing convenience, Zoom unabashedly chose convenience. And will continue to do so.<\/p>\n<p class=\"paywall\"><em>Updated July 9, 2019, 12:10pm ET to include details about Zoom on Windows and comment from Tenable.<\/em><\/p>\n<p class=\"related-cne-video-component__dek\">DDoS! It stands for distributed denial of service, a kind of attack that turns insecure, internet-connected devices into a sort of zombie army. So here&#39;s how you can avoid being part of that zombie army.<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/zoom-bug-webcam-hackers\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5d24d6cfc463480009014514\/master\/pass\/security_zoom_19108463913007.jpg\"\/><\/p>\n<p><strong>Credit to Author: Lily Hay Newman| Date: Tue, 09 Jul 2019 15:18:30 +0000<\/strong><\/p>\n<p>All it takes is one wrong click, and the popular video conferencing software will put you in a meeting with a stranger.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714,21358],"class_list":["post-15733","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security","tag-security-cyberattacks-and-hacks"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15733","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=15733"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15733\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=15733"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=15733"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=15733"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}