It is time for Zoom customers on Mac to replace—once more.
After Zoom patched a vulnerability in its Mac auto-update utility that would give malicious actors root entry earlier this week, the video conferencing software program firm issued another patch Wednesday, noting that the prior repair could possibly be bypassed.
Zoom customers on macOS ought to download and run model 5.11.6 (9890), launched August 17. You may also verify Zoom’s menu bar for updates. Ready for an automated replace might leave you waiting days whereas this exploit is publicly identified.
Zoom’s incomplete repair was reported by macOS safety researcher Csaba Fitzl, aka theevilbit of Offensive Safety. Zoom credited Fitzl in its safety bulletin (ZSB-22019) and issued a patch the day earlier than Fitzl tweeted about it.
Neither Fitzl nor Zoom detailed how Fitzl was capable of bypass the repair for the vulnerability first discovered by Patrick Wardle, founding father of the Objective-See Foundation. Wardle spoke at Def Con last week about how Zoom’s auto-update utility held onto its privileged standing to put in Zoom packages however could possibly be tricked into verifying different packages. That meant malicious actors might use it to downgrade Zoom for higher exploit entry and even to realize root entry to the system.