Windows 10's Zoom Client Can Be Hacked By Tricking UNC Path Conversion
Windows 10's Zoom Client Can Be Hacked By Tricking UNC Path Conversion (Photo by rawpixel.com form PxHere)

Zoom’s having both great and tough times amidst Coronavirus breakout. The popular video conferencing platform was earlier blamed for unfair data sharing practice, and now, a loophole of Zoom turning UNC paths to clickable links is useable for obtaining users’network credentials. While there are no reports of any attacks yet, it’s flagged critical by security researchers, as obtained credentials can be used for further attacks.

Windows 10's Zoom Client Can Be Hacked By Tricking UNC Path Conversion
Windows 10’s Zoom Client Can Be Hacked By Tricking UNC Path Conversion (Photo by rawpixel.com from PxHere)

The Conversion Flaw

Zoom’s been having a fine time due to Coronavirus, as the service is used by millions amidst the breakout. Though it’s serving many with their work from home things, it’s deeply scrutinized by many experts for possible flaws. And here it is, blamed for sharing users’ personal data with third-party services like Facebook and now, for a simple flaw which is automatic.

Zoom conferencing has a feature that automatically turns any URL into a clickable link so that participants can click on it and open in their default browser. Turns out, it’s also converting UNC paths too into clickable links. Universal Naming Convention (UNC) is a protocol that defines/directs to a resource location. If cleverly mended, it may be tuned as a photo/file storage path. This can be leveraged by attackers to send such malicious links in a group chat, which possibly lets others click on it.

UNC path turned into clickable link
UNC path turned into a clickable link

What’s the deal?

UNC protocol is destined to serve the sender with information of about network credentials, by whom the UNC links were clicked. So when a participant clicks on the UNC link, their Windows computer will connect to the attacker’s remote server via the SMB protocol. This process, by default, sends users to log in username and NTLM password hash to the attacker! And cracking a fair NTLM password hash is easy with adequate resources in hand.

A security researcher with Twitter name @_g0dmode found this and confirmed by BleepingComputer too. A remedy for this problem by Zoom removing the conversion feature for UNC paths, or users being aware of clicking links. They should differentiate between familiar links and storage paths. If not, BleepingComputer suggested a manual solution like disabling this conversion feature. This can be done by following commands.

Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> Network security: Restrict NTLM: Outgoing NTLM traffic to remote servers

Via: BleepingComputer

LEAVE A REPLY

Please enter your comment!
Please enter your name here