Search
Close this search box.

Insights

Remote Conferencing: Windows Clients Vulnerability

Share

LinkedIn
Facebook
Threads
X
Reddit
Email

Update: On Thursday, April 2, 2020, Zoom released a security patch for this vulnerability. Please update Zoom to the latest version.

Security researcher @_g0dmode wrote about a vulnerability in Zoom’s Windows Client, though this attack can be leveraged in any chat system that allows the sending of hyperlinks. Users—or in this case, the attacker—can send Universal Naming Convention (UNC) paths in the chat window. A legitimate use case for this feature would be sending a link to a document on a file share relevant to the discussion. Many chat and conferencing applications automatically convert the UNC path into a hyperlink. The target user clicks on the hyperlink and their computer tries to connect to the remote site. By default, Windows sends the user’s login information and NTLM password hash. The attacker can then crack the users NTLM password hash.

Specific to Zoom, this path-hyperlink vulnerability also allows the attacker to send a UNC path to launch an executable on the target machine.

What You Need To Do

  1. Deploy multifactor authentication for all remote access
  2. Block port 139 and 445 outbound on your firewall
  3. Prevent NTLM credentials from being sent to remote servers by configuring the following Group Policy to Deny All:
  • Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options > Network security: Restrict NTLM: Outgoing NTLM traffic to remote servers
  1. While you wait to test the above configuration changes, remind users to be wary of clicking on chat links
  • If they did click on a link and received a Windows prompt to run a program, they should hit Cancel, which will not allow the program to run

Please remember to test all configuration changes, as they could cause issues when users attempt to access shares.

For more information please visit the following sources:

Bleeping Computer: Zoom Lets Attackers Steal Windows Credentials via UNC Links

Microsoft Support: Preventing SMB traffic from lateral connections and entering or leaving the network

 

SEAN D. GOODWIN, CCSP, CISA, CISSP, GCIA, GCIH, GCWN, GSEC, PCIP, QSA
IT ASSURANCE MANAGER
617-261-8139
[email protected]

WILLIAM J. NOWIK, CISA, CISSP, QSA, PCIP
PRINCIPAL
617-428-5469
[email protected]

"*" indicates required fields

Get the insights that matter.

Stay informed with priority news and key industry updates by filling out the form to subscribe.
Name*
This field is hidden when viewing the form
This field is for validation purposes and should be left unchanged.

Connect with a Wolf Expert

"*" indicates required fields

Wolf Inquiry Form

Fill out the form below and our team will reach out to you soon.
Name*
This field is for validation purposes and should be left unchanged.

Newsletter (Insight & Case Study | Wolf Website

"*" indicates required fields

Get the insights that matter.

Stay informed with priority news and key industry updates by filling out the form to subscribe.
Name*
This field is hidden when viewing the form
This field is for validation purposes and should be left unchanged.

Data Solutions | LinkedIn Ads Form

"*" indicates required fields

Data Solutions Inquiry Form

Fill out the form below and our team will reach out to you soon.
Name*
This field is for validation purposes and should be left unchanged.

Get back to business with accounting support from Wolf & Company.

"*" indicates required fields

Outsourced Accounting Solutions Inquiry Form

Fill out the form below and our team will reach out to you soon.
Name*
This field is for validation purposes and should be left unchanged.

Data Solutions | Page

Get back to business with accounting support from Wolf & Company.

"*" indicates required fields

Fill out the form below and our team will reach out to you soon.
Name*
This field is for validation purposes and should be left unchanged.

"*" indicates required fields

Data Solutions Inquiry Form

Fill out the form below and our team will reach out to you soon.
Name*
This field is for validation purposes and should be left unchanged.

Connect with a Wolf Expert

"*" indicates required fields

Wolf Inquiry Form

Fill out the form below and our team will reach out to you soon.
Name*
This field is for validation purposes and should be left unchanged.

Fintech Inquiry Form

Fill out the form below and our team will reach out to you soon.
Name(Required)

Fintech Inquiry Form

Fill out the form below and our team will reach out to you soon.

Get back to business with accounting support from Wolf & Company.

"*" indicates required fields

Outsourced Accounting Solutions Inquiry Form

Fill out the form below and our team will reach out to you soon.
Name*
This field is for validation purposes and should be left unchanged.

"*" indicates required fields

DenSecure Inquiry Form

Fill out the form below and our team will reach out to you soon.
Name*
This field is for validation purposes and should be left unchanged.

We’re here to help.

"*" indicates required fields

Fill out the form below and our team will reach out to you soon.
Name*
This field is hidden when viewing the form
This field is for validation purposes and should be left unchanged.