Zoom Patches worrying security windows error – make sure you’re protected, update now


  • Zoom warns multiple versions of its Windows client is vulnerable
  • A security error can be used to fully take over target points
  • ZOOM ADVISES AT ATTAINED ADDRESS SUPPORT so users need to update now

Zoom has patched a critical severity that could have enabled threat actors to escalate their privileges over the network.

The online collaboration tool found that the Windows application does not always use explicit full trails when loading dynamic libraries (DLLs). Instead, it depends on Windows’ default search order, which means that if an attacker was to place a malicious dll in the right place, zoom can load and perform it. It corresponds to the bring-your-oven-vulnerable-driver-type attack, though not identical.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top