Context over chaos. Disconnected technologies, siloed data, and reactive processes can only get you so far. Protecting businesses in today’s threat landscape demands more than a set of security tools – it requires context.
That's where Avertium comes in
Security. It’s in our DNA. It’s elemental, foundational. Something that an always-on, everything’s-IoT-connected world depends on.
Helping mid-to-enterprise organizations protect assets and manage risk is our only business. Our mission is to make our customers’ world a safer place so that they may thrive in an always-on, connected world.
Best-in-class technology from our partners... backed by service excellence from Avertium.
Interested in becoming a partner?
With Avertium's deal registration, partners can efficiently and confidently connect with Avertium on opportunities to protect your deals.
Microsoft Copilot for Security analyzes and synthesizes high volumes of security data which can help healthcare cybersecurity teams do more with less.
Dive into our resource hub and explore top
cybersecurity topics along with what we do
and what we can do for you.
This threat report is about a recently discovered Zoom Client for Windows vulnerability. Successful exploitation allows a remote attacker to execute arbitrary code on a victim’s computer.
Zoom has issued an updated Client for Windows that is not susceptible to this vulnerability. You can access updated information under the "What You Can Do" section of this report.
This remote code execution “zero-day” vulnerability allows a remote attacker to execute arbitrary code on a victim’s machine that is running any version of Zoom Client for Windows on Windows version 7 or prior. This is done by prompting the user to perform a normal action, such as opening a document file, that initiates the malicious code execution to begin in the background. In analyzed cases, the user did not receive any type of security warning during the attack.
This weakness is only exploitable on systems running Windows 7 and earlier. Although Microsoft’s official support for Windows 7 ended in January, many individuals and businesses continue to use this version through Microsoft’s Extended Security Updates.
Anyone using Zoom Client on Windows version 7 or older are highly advised to update to the newest version of Zoom Client for Windows. Systems running Windows 7 that are fully updated with Extended Security updates are still vulnerable while using any of the previous versions of Zoom.
Despite Zoom’s highly persistent auto-update method, many users continue to use older supported versions. Because of this, additional technical details of this exploit are not being published during this time to prevent an increase in attacks on those who might still be at risk.
The exploitation of this vulnerability could have a critical impact on an organization since it enables malicious code execution on the system running the Zoom client. If a device is successfully compromised, it could lead to additional hosts being infected on the network.
Related Reading: Stop! Using Online Collaboration Tools Until You Read This
It is highly recommended that any systems running Zoom Client on Windows 7 or prior apply the newest update released from Zoom to remediate this vulnerability on the affected systems.
Related Reading: Zoom Virtual Meeting Vulnerabilities
Zoom (Update resources): https://zoom.us/
IBM X-Force Exchange: https://exchange.xforce.ibmcloud.com/vulnerabilities/184837
0patch Blog: https://blog.0patch.com/2020/07/remote-code-execution-vulnerability-in.html
MITRE Mapping: https://attack.mitre.org/techniques/T1203/
Note: The Avertium Threat Report analyzes one current threat that has been shared by threat intelligence networks across the globe. Used internally by the Avertium CyberOps Team, this report will outline a “top-of-mind” threat and how it ought to be addressed accordingly.
This informed analysis is based on the latest data available.
Contact us for more information about Avertium’s managed security service capabilities.
Deciding between running an in-house SOC vs. using managed security services (MSS) to add more rigor, more relevance, and more responsiveness to your cybersecurity program? Compare the two options. Download the e-book!