Enlarge / A critical vulnerability in Zoom for MacOS, patched as soon as final weekend, might nonetheless be bypassed as of Wednesday. Users ought to replace again.
It’s time for Zoom customers on Mac to replace—again.
After Zoom patched a vulnerability in its Mac auto-update utility that might give malicious actors root entry earlier this week, the video conferencing software program firm issued one other patch Wednesday, noting that the prior fix might be bypassed.
Zoom customers on macOS ought to obtain and run model 5.11.6 (9890), launched August 17. You may test Zoom’s menu bar for updates. Waiting for an automated replace might depart you ready days whereas this exploit is publicly identified.
Zoom’s incomplete fix was reported by macOS safety researcher Csaba Fitzl, aka theevilbit of Offensive Security. Zoom credited Fitzl in its safety bulletin (ZSB-22019) and issued a patch the day earlier than Fitzl tweeted about it.
Neither Fitzl nor Zoom detailed how Fitzl was in a position to bypass the fix for the vulnerability first found by Patrick Wardle, founding father of the Objective-See Foundation. Wardle spoke at Def Con final week about how Zoom’s auto-update utility held onto its privileged standing to put in Zoom packages however might be tricked into verifying different packages. That meant malicious actors might use it to downgrade Zoom for higher exploit entry and even to achieve root entry to the system.