Zoom headquarters

Flaw in Video Conferencing App Could Have Given Hackers Immediate Access to Webcam Feeds

The company, Zoom, is now taking action to update its software after a security researcher discovered several serious security vulnerabilities in the popular video chat app.

A security vulnerability in a popular video conferencing app could have allowed hackers access to users’ webcam video feeds, according to the findings of software engineer and researcher Jonathan Leitschuh. In the wake of complaints from its customers, the company, Zoom, is now acting to address the security issues.

The popular video conferencing application for businesses boasts at least 40 million customers and is well known for offering a simple user experience. All you have to do is download the Zoom app to a laptop, click the meeting URL and watch as the application immediately opens and joins the call.

The seamless technology that makes Zoom so attractive to users is also the reason it could be easily hacked, particularly on Apple computers. In a Medium post laying out his research, Leitschuh wrote that he was drawn to look into the app because he was curious about how the functionality was implemented securely.

“Come to find out, it really hadn’t been implemented securely,” Leitschuh wrote. “Nor can I figure out a good way to do this that doesn’t require an additional bit of user interaction to be secure.”

Leitschuh found that the app sets up a local web server on every Mac that allows call URLS to automatically launch the application, bypassing any pop-up windows asking the user to confirm they want to open Zoom. (This feature is not so easy with Windows, but users can check a box to permanently dismiss the warnings and start video chats immediately, WIRED magazine reported).

But by going around the pop-ups, users were not given a valuable tool to deny access to their webcam feeds. As Leitschuh found, an attacker could set up a malicious call, trick users into clicking the link and immediately have access to their video feeds.

He also found that attackers could wage a denial of service (DoS) attack against Apple computers by using a malicious link to barrage the computer with call requests. The company fixed this issue in a May patch.

In addition, Leitschuh was disturbed by the fact that the Zoom local web server was not deleted from Macs even if the user deleted the Zoom application, allowing it to be easily redownloaded automatically if someone clicked a malicious meeting link.

Once he discovered these vulnerabilities, Leitschuh notified Zoom’s security team and gave them 90 days to fix the problems, offering a “quick fix” and suggestions for long-term solutions. He said he was frustrated by the team’s slow response and disagreements over the potential security risks of preserving the functionality of the app.

“An organization of this profile and with such a large user base should have been more proactive in protecting their users from attack,” Leitschuh wrote.

Since then, Leitschuh and other researchers have spoken with Zoom’s CEO, and the company has taken action to address the problems. Though the company maintained that it has “no indication” that a hacker ever carried out an attack similar to those described by Leitschuh, Zoom issued a patch Tuesday night that removes the local web server from Mac computers and adds an option to manually uninstall the app, including the local server.

The company is also planning another major update for later this week that will allow first-time and returning users to turn off the function that automatically gives access to their video feeds. In addition, Zoom will make it easier for researchers like Leitschuh to submit their security concerns through a “public vulnerability disclosure program” to be launched in the next several weeks.

For security experts, the episode was an example of how local web servers can pose a variety of risks for users.

“This is just one of many examples where locally running HTTP servers can vastly undermine security,” said Craig Young, a computer security researcher for Tripwire’s Vulnerability and Exposure Research Team. “The problem, at its core, is that Zoom allows for control via HTTP requests and HTTP requests can be forged from the browser by any web site a victim opens.”

Featured

  • Brivo, Eagle Eye Networks Merge

    Dean Drako, Chairman of Brivo, the leading global provider of cloud-native access control and smart space technologies, and Founder of Eagle Eye Networks, the global leader in cloud AI video surveillance, today announced the two companies will merge, creating the world’s largest AI cloud-native physical security company. The merged company will operate under the Brivo name and deliver a truly unified cloud-native security platform. Read Now

  • Security Industry Association Announces the 2026 Security Megatrends

    The Security Industry Association (SIA) has identified and forecasted the 2026 Security Megatrends, which form the basis of SIA’s signature annual Security Megatrends report defining the top 10 factors influencing both near- and long-term change in the global security industry. Read Now

  • The Future of Access Control: Cloud-Based Solutions for Safer Workplaces

    Access controls have revolutionized the way we protect our people, assets and operations. Gone are the days of cumbersome keychains and the security liabilities they introduced, but it’s a mistake to think that their evolution has reached its peak. Read Now

  • A Look at AI

    Large language models (LLMs) have taken the world by storm. Within months of OpenAI launching its AI chatbot, ChatGPT, it amassed more than 100 million users, making it the fastest-growing consumer application in history. Read Now

  • First, Do No Harm: Responsibly Applying Artificial Intelligence

    It was 2022 when early LLMs (Large Language Models) brought the term “AI” into mainstream public consciousness and since then, we’ve seen security corporations and integrators attempt to develop their solutions and sales pitches around the biggest tech boom of the 21st century. However, not all “artificial intelligence” is equally suitable for security applications, and it’s essential for end users to remain vigilant in understanding how their solutions are utilizing AI. Read Now

New Products

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.