ZOOM PATCHES ZOOM SAFETY SECURITY FAILS: Make sure it is protected, now update




  • Zoom warns of multiple versions of his Windows client are vulnerable
  • You can use a security failure to completely assume the final points of destination
  • Zoom advises patches immediately, so users must now be updated

Zoom has patched a vulnerability of critical gravity that could have allowed threat actors to intensify their privileges on the network.

The online collaboration tool found that its Windows application does not always use complete complicit routes when loading dynamic libraries (DLL). On the other hand, it is based on the predetermined Windows search order, which means that if an attacker placed a malicious DLL in the correct location, zoom can load and execute it. It is similar to the type of vulnerable driving attack, although not identical.

Leave a Comment

Your email address will not be published. Required fields are marked *