The 'Zoom client for Windows' is vulnerable to the '
The latest finding by cybersecurity expert @_g0dmode, has also been "confirmed by researcher Matthew Hickey and Mohamed A. Baset,' the report said late Wednesday.
The attack involves the "SMBRelay technique" wherein Windows automatically exposes a user's login username and NTLM password hashes to a remote server, when attempting to connect and download a file hosted on it.
"The attack is possible only because Zoom for Windows supports remote UNC paths, which converts such potentially insecure URLs into hyperlinks for recipients in a personal or group chat," the report claimed.
Besides Windows credentials, the vulnerability can also be exploited to launch any programme present on a targeted computer.
Zoom has been notified of this bug but the flaw is yet to be fixed.
"Users are advised to either use an alternative video conferencing software or Zoom in your web browser instead of the dedicated client app," said the report.
Another media report claimed that Zoom doesn't use end-to-end encryption to protect calling data of its users.
As businesses, schools and colleges and millions of SMBs use video conferencing tool Zoom during the work-from-home scenario, the US Federal Bureau of Investigation (FBI) has warned people about porn material being popped up during the video meetings.
The Boston branch of the law enforcement agency said it has received multiple reports of Zoom conferences being disrupted by pornographic and/or hate images and threatening language.
The video conferencing app late last month updated its iOS app to remove the
--IANS
na/