Zoom’s auto update feature could exploit vulnerability in Mac OS

The vulnerability in Apple’s MacBook OS could have been exploited by attackers using the auto-update feature from Zoom video calling app

August 18, 2022 06:10 pm | Updated 06:10 pm IST

The vulnerability in Apple’s MacBook OS could have been exploited by attackers using the auto-update feature from Zoom video calling app

The vulnerability in Apple’s MacBook OS could have been exploited by attackers using the auto-update feature from Zoom video calling app | Photo Credit: Reuters

The alert has been issued for vulnerabilities in Apple’s operating systems including iPad OS and iOS, that can be exploited by remote attackers to execute arbitrary codes on targeted systems. 

(Sign up to our Technology newsletter, Today’s Cache, for insights on emerging themes at the intersection of technology, business and policy. Click here to subscribe for free.)

The threat alert from CERT-In noted that the vulnerability exists due to out-of-bounds write in kernel and WebKit components of the software. The vulnerability has been noted to be used by remote attackers by enticing victims to open specially crafted files. 

Zoom, a video-calling app, in its security bulletin acknowledged that the vulnerabilities in Apple’s software and its auto update process could be exploited by attackers to escalate their privileges to root files in Mac OS, thereby compromising the security of the affected systems. 

In Apple’s kernel process, the vulnerability, according to information on its website, can allow an application to execute arbitrary code with kernel privileges. In the WebKit the vulnerability was found to be used by processing maliciously crafted web content that could lead to arbitrary code execution. 

In iOS and iPad OS the vulnerabilities were found to affect versions 15.6.1. “Apple is aware of a report that this issue may have been actively exploited”, the company stated in its website. 

Both Apple and Zoom have advised users to update to their latest security patches to fix the vulnerability. 

CERT-In, earlier this month, had also released alerts for high severity vulnerabilities in Mac OS, iPad OS, and iOS that could have been exploited by attackers to execute arbitrary code and bypass security restrictions on affected devices. 

0 / 0
Sign in to unlock member-only benefits!
  • Access 10 free stories every month
  • Save stories to read later
  • Access to comment on every story
  • Sign-up/manage your newsletter subscriptions with a single click
  • Get notified by email for early access to discounts & offers on our products
Sign in

Comments

Comments have to be in English, and in full sentences. They cannot be abusive or personal. Please abide by our community guidelines for posting your comments.

We have migrated to a new commenting platform. If you are already a registered user of The Hindu and logged in, you may continue to engage with our articles. If you do not have an account please register and login to post comments. Users can access their older comments by logging into their accounts on Vuukle.