![]() ![]() ![]() Sending a very specific stanza, which he detailed, results in creating a ClusterSwitch task in the Zoom client with an attacker-controlled web domain as a parameter.Ĭreating a man-in-the-middle (MITM) server to exploit this bug also revealed a bunch of data from the /clusterswitch endpoint, including a list of domains for various Zoom services. However, Frantric noted the "most impactful vector" in the stanza smuggling vulnerability can allow an attacker to exploit the cluster switch. XMPP stanza smuggling can be used for a variety of nefarious purposes - everything from spoofing messages to make them look like they are coming from a different user to sending control messages that will be accepted as if they are coming from the server. Fun fact: If you noticed a while ago Zoom's web client going AWOL for a week, it's because someone found a passcode-cracking hole.Zoom strong-armed by US watchdog to beef up security after boasting of end-to-end encryption that didn't exist.Cisco's Webex app phoned home audio telemetry even when muted.Start a phone call or video meeting from a chat message. ![]() America, when you're done hitting us with the ban hammer, see these on-prem Zoom vulns, says Positive Enable modern collaboration with Team Chat & channels, Phone, Whiteboard, and Meetings in a single offering.The vulnerability abuses inconsistencies between XML parsers in Zoom's client and server software to "smuggle" malicious XMPP stanzas to the victim client, Fratric wrote. However, it uses the same connection to send client messages as it does to send control messages from the server. It works by sending short pieces of XML called stanzas over a stream connection. XMPP is the messaging protocol that Zoom uses for its chat functionality.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |