Zoom Vulnerabilities Research - absentee-neptune/Senior-Capstone GitHub Wiki

What it has access to:

  • Camera
  • Microphone
  • Computer Screen

Common Zoom Vulnerabilities:

  • Lack of end-to-end encryption allows malicious actors to intercept data as the information is coming across the internet.
    • Allows the capturing of camera, chat and microphone information from transmitted packets
    • Allows the facilitation of Zoom Bombing.
  • With Mac OSX version of the zoom application, malicious actors that intercepted packets, or exploited the application were able to turn on user cameras, even when the app is open or uninstalled
    • There were instances of this appearing on windows environments, but it is infrequent and inconsistent in terms of reports.
  • Iterations of zoom on windows 8 and earlier were able to be exploited in order for code to be executed on the host computer, allowing people to gain full access to a computer.
    • commonly used for the purpose of installing rootkits or executing malicious code.
  • The ability to execute code inside of the zoom environment by exploiting the use of GIFs in the chat environment. This causes the javascript of the chat window to allow code to be executed when uploaded inside of a piece of media.
  • The ability to access router information using port 254 utilized by the zoom service.
  • Zoom had an exploit utilizing the UNC Links of a windows system, allowing the password of windows users to be exposed to other users inside of the system.
  • Zoom had a exploit, allowing privilege escalation inside of the system where Zoom is installed, allowing a low privilege user to gain access to essential systems.

Sprint 1 References