At an event organized by cyber security researchers Zoom in software a critical deficit was discovered. Authorities announced that thanks to the discovered vulnerability, Zoom users can run any code they want on their computers. RCE (Remote Code Execution) After the attack exploited its vulnerability, the competitors managed to run code on the target computer.
RCE vulnerability, which enables hackers to run code remotely, causes malicious people to take control of target systems.
Hackers can hack users during Zoom meeting
Zero Day Initiative edited by Pwn2Own event hosted hundreds of white hat hackers this year. Especially server, internet browsers, virtualization software and corporate software In 23 different categories Important gaps were discovered in the competitions held.
Zoom, which has become a part of our lives with the pandemic process, came up with the hacking scandal last year. Daan Keuper and Thijs Alkemade, who discovered RCE (Remote Code Execution) vulnerability in the Zoom application at the Pwn2Own event $ 200,000 won an award.
Zoom has not yet closed the discovered critical gap. Making a statement on the subject, the company said, “Thank you to our friends named Daan Keuper and Thijs Alkemad for successful work. Zoom Chat The vulnerability in the system does not affect the webinar feature. ” used the expressions.
Some cyber security experts, He stated that hackers, known as black hats and damaging systems, can also discover this vulnerability.
Malwarebytes antivirus firm named, both of the discovered vulnerability Windows him the Mac announced that it works on devices. Although it has not been tested yet, it is thought that Android and iOS devices may also be affected by this vulnerability.
— Zero Day Initiative (@thezdi) April 7, 2021