In a pivotal move to ensure the safety and security of online users, the Office of Internet Security (OSI) urges immediate action in response to a critical security alert regarding Zoom software.
This advisory carries an utmost importance rating of level 5, underscoring the gravity of the situation. It is, therefore, paramount to heed this alert and take prompt measures to safeguard yourself.
Update to the Latest Version of Zoom Now!
These are the various versions of Zoom across multiple platforms (Windows, iOS, Android, macOS, and Linux):
- Desktop Client
- Client SDK
- VDI Client
Zoom, a prominent software provider, has recently posted multiple security advisories on their official website, addressing vulnerabilities within their application. Moreover, three of these vulnerabilities have been classified as critical.
To address these vulnerabilities effectively, it is strongly advised to promptly update to the most recent version of Zoom.
To do this, navigate to the ‘Download Centre‘ on the Zoom website. From there, select the appropriate operating system for your device and proceed to install the latest version of the application. Alternatively, you can open your account, and click on your profile picture. This should then give you an option to “check for updates”
The latest “Desktop Client” Version is 5.15.7
Zoom has diligently crafted an update that rectifies a series of identified security issues. Among these issues, three have been marked as having a critical severity level, while the others span across high and medium severity levels.
The critical vulnerabilities identified within the Zoom application for Windows and VDI have the potential to be exploited by malicious scammers to gain unauthorised privileges through network access. Furthermore, this update addresses a range of vulnerabilities of varying severity tied to the aforementioned concerns. Additionally, it tackles a security breach that could lead to denial-of-service attacks. Notably, these updates pertain to versions of Zoom on Windows, iOS, macOS, Android, and Linux platforms.
Exploitation of these vulnerabilities could empower attackers to gain unauthorised access to accounts, expose or capture sensitive information locally, or disrupt meetings and calls.
Also read: Beware of scammers impersonating Netflix