Zoom Vulnerability Lets Attackers Steal Windows Login Credentials: Researchers

Zoom Vulnerability Lets Attackers Steal Windows Login Credentials: Researchers
The Windows shopper of viral video chat app, Zoom, reportedly has a essential vulnerability that might enable attackers to steal the login credentials of customers. According to cybersecurity researchers, Matthew Hickey (@HackerFantastic) and Mitch (@_g0dmode0), the software program’s chat function is weak to UNC path injection, enabling attackers to seize the NTLM password hashes each time somebody clicks on a hyperlink inside messages.

As reported by Bleeping Computer, the vulnerability stems from the truth that Zoom robotically converts all URLs which might be despatched through textual content messages into hyperlinks. However, it presently fails to tell apart between precise URLs and Windows networking UNC paths, changing all of them into hyperlinks en masse. If a person clicks on a UNC path hyperlink, Windows will try to connect with the distant web site, thereby sending the person’s login title and NTLM password hash to the malicious server.

The researchers additionally launched a proof-of-concept demo that not solely illustrates how the password hashes could be despatched to third-party servers, however how they are often even be cracked utilizing free instruments like Hashcat to dehash, doubtlessly jeopardizing hundreds of thousands of customers. As if that wasn’t unhealthy sufficient, Hickey additionally claims that the vulnerability can be utilized to launch packages on a neighborhood pc through the use of the same course of.

The drawback remained unresolved as of Tuesday, however Hickey says that Zoom can simply mitigate it by now not changing UNC paths into clickable hyperlinks. “Zoom should not render UNC paths as hyperlinks is the fix, I have notified Zoom as I disclosed it on Twitter”, he informed Bleeping Computer. Zoom is but to launch a repair to mitigate the vulnerability, however there are a few handbook workarounds utilizing the Group Policy Editor and the Windows Registry. You can verify them out on Bleeping Computer.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.