Zoom headquarters

Flaw in Video Conferencing App Could Have Given Hackers Immediate Access to Webcam Feeds

The company, Zoom, is now taking action to update its software after a security researcher discovered several serious security vulnerabilities in the popular video chat app.

A security vulnerability in a popular video conferencing app could have allowed hackers access to users’ webcam video feeds, according to the findings of software engineer and researcher Jonathan Leitschuh. In the wake of complaints from its customers, the company, Zoom, is now acting to address the security issues.

The popular video conferencing application for businesses boasts at least 40 million customers and is well known for offering a simple user experience. All you have to do is download the Zoom app to a laptop, click the meeting URL and watch as the application immediately opens and joins the call.

The seamless technology that makes Zoom so attractive to users is also the reason it could be easily hacked, particularly on Apple computers. In a Medium post laying out his research, Leitschuh wrote that he was drawn to look into the app because he was curious about how the functionality was implemented securely.

“Come to find out, it really hadn’t been implemented securely,” Leitschuh wrote. “Nor can I figure out a good way to do this that doesn’t require an additional bit of user interaction to be secure.”

Leitschuh found that the app sets up a local web server on every Mac that allows call URLS to automatically launch the application, bypassing any pop-up windows asking the user to confirm they want to open Zoom. (This feature is not so easy with Windows, but users can check a box to permanently dismiss the warnings and start video chats immediately, WIRED magazine reported).

But by going around the pop-ups, users were not given a valuable tool to deny access to their webcam feeds. As Leitschuh found, an attacker could set up a malicious call, trick users into clicking the link and immediately have access to their video feeds.

He also found that attackers could wage a denial of service (DoS) attack against Apple computers by using a malicious link to barrage the computer with call requests. The company fixed this issue in a May patch.

In addition, Leitschuh was disturbed by the fact that the Zoom local web server was not deleted from Macs even if the user deleted the Zoom application, allowing it to be easily redownloaded automatically if someone clicked a malicious meeting link.

Once he discovered these vulnerabilities, Leitschuh notified Zoom’s security team and gave them 90 days to fix the problems, offering a “quick fix” and suggestions for long-term solutions. He said he was frustrated by the team’s slow response and disagreements over the potential security risks of preserving the functionality of the app.

“An organization of this profile and with such a large user base should have been more proactive in protecting their users from attack,” Leitschuh wrote.

Since then, Leitschuh and other researchers have spoken with Zoom’s CEO, and the company has taken action to address the problems. Though the company maintained that it has “no indication” that a hacker ever carried out an attack similar to those described by Leitschuh, Zoom issued a patch Tuesday night that removes the local web server from Mac computers and adds an option to manually uninstall the app, including the local server.

The company is also planning another major update for later this week that will allow first-time and returning users to turn off the function that automatically gives access to their video feeds. In addition, Zoom will make it easier for researchers like Leitschuh to submit their security concerns through a “public vulnerability disclosure program” to be launched in the next several weeks.

For security experts, the episode was an example of how local web servers can pose a variety of risks for users.

“This is just one of many examples where locally running HTTP servers can vastly undermine security,” said Craig Young, a computer security researcher for Tripwire’s Vulnerability and Exposure Research Team. “The problem, at its core, is that Zoom allows for control via HTTP requests and HTTP requests can be forged from the browser by any web site a victim opens.”

  • Approaching the Education Market with Milestone Approaching the Education Market with Milestone

    Milestone’s Laurie Dickson addresses Open Architecture, new equipment and the cost of entry and upgrading VMS systems over time. She also talks about how K-12 and Higher Education campuses differ in regard to surveillance system needs. Schools have certain guidelines they must follow to protect student identities, and Laurie addresses this question as well.

Digital Edition

  • Security Today Magazine - January February 2022

    January / February 2022


    • A Power User
    • The Benefits of Transformation
    • Cloud Storage Training
    • Popular Access Control
    • Where Solar and Security Meet

    View This Issue

  • Environmental Protection
  • Occupational Health & Safety
  • Infrastructure Solutions Group
  • Spaces4Learning
  • Campus Security & Life Safety