The exploit targets the Zoom installer, which requires a user password when first added, The Verge notes (Opens in a new window). The weakness, revealed by Mac security specialist Patrick Wardle at last week's DefCon, was patched in Zoom version 5.11.5, which is available now. 13 security bulletin (Opens in a new window), Zoom versions 5.7.3 to 5.11.5 contain an auto-update vulnerability that could be exploited by a local low-privileged user to gain unrestricted access to Apple's operating system. Zoom has fixed a bug that could've allowed unrestricted access to macOS systems.Īccording to an Aug.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |