{"id":4375,"date":"2023-12-01T04:02:02","date_gmt":"2023-12-01T04:02:02","guid":{"rendered":"https:\/\/secry.me\/explore\/?p=4375"},"modified":"2023-12-03T18:01:37","modified_gmt":"2023-12-03T18:01:37","slug":"critical-zoom-vulnerability-allowed-to-take-over-meetings-and-infiltrate-zoom-tenants","status":"publish","type":"post","link":"https:\/\/secry.me\/explore\/critical-zoom-vulnerability-allowed-to-take-over-meetings-and-infiltrate-zoom-tenants\/","title":{"rendered":"Critical Zoom Vulnerability Allowed to Take Over Meetings and Infiltrate Zoom Tenants"},"content":{"rendered":"<div class=\"c7f5092f831f91fb6af859cc3a8052cc\" data-index=\"4\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/securepubads.g.doubleclick.net\/tag\/js\/gpt.js\"><\/script>\r\n<script>\r\n  window.googletag = window.googletag || {cmd: []};\r\n  googletag.cmd.push(function() {\r\n    googletag.defineSlot('\/22608490431\/iklan1', [[320, 100], [300, 50]], 'div-gpt-ad-1696178236578-0').addService(googletag.pubads());\r\n    googletag.pubads().enableSingleRequest();\r\n    googletag.enableServices();\r\n  });\r\n<\/script>\r\n<!-- \/22608490431\/iklan1 -->\r\n<div id='div-gpt-ad-1696178236578-0' style='min-width: 300px; min-height: 50px;'>\r\n  <script>\r\n    googletag.cmd.push(function() { googletag.display('div-gpt-ad-1696178236578-0'); });\r\n  <\/script>\r\n<\/div>\n<\/div>\n<h2>A critical vulnerability in Zoom Room enabled malicious actors to take over control of meetings and pilfer confidential information.<\/h2>\n<p><em>The Zoom vulnerability was initially identified in June 2023. Although the discovery occurred earlier, the specific information was only publicly revealed on November 28, 2023.<\/em><\/p>\n<p><strong>Zoom Vulnerability &#8211; Zoom Room &#8211;<\/strong> Zoom, a leading video conferencing platform, is under scrutiny due to a critical vulnerability discovered in Zoom Rooms, a feature designed for collaborative meetings in physical spaces. Researchers at AppOmn identified this flaw during the HackerOne live hacking event H1-4420 in June 2023, raising concerns about potential unauthorized access to Zoom tenants.<\/p>\n<p>The <a href=\"https:\/\/secry.me\/explore\/category\/cyber-security\/\">vulnerability<\/a> enables attackers to seize control of Zoom Room service accounts, providing access to the victim organization&#8217;s tenant. This poses lead to a significant security risk as it allows attackers invisibly access to infiltrate confidential data within Team Chat, Whiteboards, and other Zoom applications without detection. While acknowledging the severity of the issue, Zoom promptly addressed it and clarified that it had no impact on production tenants.<\/p>\n<h3>Understanding the Zoom Room Vulnerability and Its Far-reaching Consequences<\/h3>\n<p>The exploit involves predicting service account email addresses, a process facilitated by Zoom&#8217;s automatic assignment of email addresses in the format rooms_&lt;account ID&gt;@companydomain.com. The account ID, derived from the user ID value of the service account, inherits the email domain from the user with the Owner role during account creation.<\/p>\n<p>Ciar\u00e1n Cotter from AppOmni, in a blog post shared with Hackread.com, highlighted the implications of the vulnerability. Once attackers gain access to an organization&#8217;s tenant, they can compromise confidential data shared within Team Chat, Whiteboards, and other Zoom applications. For your information, <a href=\"https:\/\/support.zoom.com\/hc\/en\/article?id=zm_kb&amp;sysparm_article=KB0063391#:~:text=Zoom%20Rooms%20is%20a%20software,or%20from%20their%20mobile%20device.\" target=\"_blank\" rel=\"nofollow noopener\">Zoom Rooms<\/a>, facilitating collaboration among team members in different physical locations, relies on service accounts created with licenses for Whiteboards and Meetings. These service accounts possess extensive access within the tenant, resembling regular team members.<\/p>\n<p>The flaw becomes more critical when attackers, in the same meeting as a Zoom Room, message it on Team Chat, exposing the entire email address in the format rooms_&lt;account ID&gt;@companydomain.com. Exploiting this information, threat actors can create arbitrary Outlook email addresses, matching the format room__&lt;account ID&gt;@outlook.com. Then by Following the Zoom sign-up flow, they receive an activation link sent to the Zoom Room&#8217;s email address, allowing them to activate the compromised account.<\/p>\n<p>Compounding the security concern, by the fact service accounts could not be removed from Team Chat channels. Researchers noted that Room users, including the Owner, could persistently view the contents of any channel, including confidential information, invisibly. This discovery highlights the potential misuse of service accounts to gain unauthorized access to SaaS systems.<\/p>\n<p>&nbsp;<\/p>\n<h3>Addressing the Vulnerability: Zoom&#8217;s Swift Response and the Imperative for Heightened Security Measures<\/h3>\n<p>Zoom responded to this vulnerability by removing the ability to activate Zoom Room accounts, preventing <a href=\"https:\/\/secry.me\/explore\/category\/news\/\">threat<\/a> actors from exploiting the predictable email format. This incident underscores the importance of continuous need for enhancing security measures in widely-used collaboration tools like Zoom Rooms. We urge organizations to stay vigilant in the face of evolving security threats, ensuring robust protection against unauthorized access to sensitive organizational data.<\/p>\n<div id=\"urban-overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban-overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban-overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban-overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban-overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban-overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban-overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban-overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban-overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban-overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban-overlay\"><\/div>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>A critical vulnerability in Zoom Room enabled malicious actors to take over control of meetings and pilfer confidential information. The Zoom vulnerability was initially identified in June 2023. Although the discovery occurred earlier, the specific information was only publicly revealed on November 28, 2023. Zoom Vulnerability &#8211; Zoom Room &#8211; Zoom, a leading video conferencing [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":4386,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[194,131],"tags":[411,412,8,267,408,409,410],"class_list":{"0":"post-4375","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-security","8":"category-news","9":"tag-appomn","10":"tag-h1-4420","11":"tag-takeover","12":"tag-threat","13":"tag-zoom-room","14":"tag-zoom-tenants","15":"tag-zoom-vulnerability"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v21.4 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Critical Zoom Vulnerability Allowed to Take Over Meetings and Infiltrate Zoom Tenants | SECRY<\/title>\n<meta name=\"description\" content=\"A critical vulnerability in Zoom Room enabled malicious actors to take over control of meetings and pilfer confidential information. The Zoom\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/secry.me\/explore\/critical-zoom-vulnerability-allowed-to-take-over-meetings-and-infiltrate-zoom-tenants\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Critical Zoom Vulnerability Allowed to Take Over Meetings and Infiltrate Zoom Tenants | SECRY\" \/>\n<meta property=\"og:description\" content=\"A critical vulnerability in Zoom Room enabled malicious actors to take over control of meetings and pilfer confidential information. The Zoom\" \/>\n<meta property=\"og:url\" content=\"https:\/\/secry.me\/explore\/critical-zoom-vulnerability-allowed-to-take-over-meetings-and-infiltrate-zoom-tenants\/\" \/>\n<meta property=\"og:site_name\" content=\"SECRY\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/secry.me\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-01T04:02:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-03T18:01:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/secryweb.sirv.com\/WP_secry.me\/2023\/12\/Zoom-Room-Vulnerability.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1820\" \/>\n\t<meta property=\"og:image:height\" content=\"1094\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Christin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Christin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"NewsArticle\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/critical-zoom-vulnerability-allowed-to-take-over-meetings-and-infiltrate-zoom-tenants\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/critical-zoom-vulnerability-allowed-to-take-over-meetings-and-infiltrate-zoom-tenants\\\/\"},\"author\":{\"name\":\"Christin\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#\\\/schema\\\/person\\\/a0dca9413073b143bfc0db687dd0b0d6\"},\"headline\":\"Critical Zoom Vulnerability Allowed to Take Over Meetings and Infiltrate Zoom Tenants\",\"datePublished\":\"2023-12-01T04:02:02+00:00\",\"dateModified\":\"2023-12-03T18:01:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/critical-zoom-vulnerability-allowed-to-take-over-meetings-and-infiltrate-zoom-tenants\\\/\"},\"wordCount\":536,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/critical-zoom-vulnerability-allowed-to-take-over-meetings-and-infiltrate-zoom-tenants\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/secry.me\\\/explore\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/Zoom-Room-Vulnerability.jpg\",\"keywords\":[\"AppOmn\",\"H1-4420\",\"takeover\",\"Threat\",\"Zoom Room\",\"Zoom Tenants\",\"Zoom Vulnerability\"],\"articleSection\":[\"Cyber Security\",\"Hacker News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/secry.me\\\/explore\\\/critical-zoom-vulnerability-allowed-to-take-over-meetings-and-infiltrate-zoom-tenants\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/critical-zoom-vulnerability-allowed-to-take-over-meetings-and-infiltrate-zoom-tenants\\\/\",\"url\":\"https:\\\/\\\/secry.me\\\/explore\\\/critical-zoom-vulnerability-allowed-to-take-over-meetings-and-infiltrate-zoom-tenants\\\/\",\"name\":\"Critical Zoom Vulnerability Allowed to Take Over Meetings and Infiltrate Zoom Tenants | SECRY\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/critical-zoom-vulnerability-allowed-to-take-over-meetings-and-infiltrate-zoom-tenants\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/critical-zoom-vulnerability-allowed-to-take-over-meetings-and-infiltrate-zoom-tenants\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/secry.me\\\/explore\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/Zoom-Room-Vulnerability.jpg\",\"datePublished\":\"2023-12-01T04:02:02+00:00\",\"dateModified\":\"2023-12-03T18:01:37+00:00\",\"description\":\"A critical vulnerability in Zoom Room enabled malicious actors to take over control of meetings and pilfer confidential information. The Zoom\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/critical-zoom-vulnerability-allowed-to-take-over-meetings-and-infiltrate-zoom-tenants\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/secry.me\\\/explore\\\/critical-zoom-vulnerability-allowed-to-take-over-meetings-and-infiltrate-zoom-tenants\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/critical-zoom-vulnerability-allowed-to-take-over-meetings-and-infiltrate-zoom-tenants\\\/#primaryimage\",\"url\":\"https:\\\/\\\/secry.me\\\/explore\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/Zoom-Room-Vulnerability.jpg\",\"contentUrl\":\"https:\\\/\\\/secry.me\\\/explore\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/Zoom-Room-Vulnerability.jpg\",\"width\":1820,\"height\":1094,\"caption\":\"Illustration of Zoom Room Vulnerability - This is Zoom office lobby . Source: blog.zoom.us\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/critical-zoom-vulnerability-allowed-to-take-over-meetings-and-infiltrate-zoom-tenants\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/secry.me\\\/explore\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Critical Zoom Vulnerability Allowed to Take Over Meetings and Infiltrate Zoom Tenants\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#website\",\"url\":\"https:\\\/\\\/secry.me\\\/explore\\\/\",\"name\":\"SECRY\",\"description\":\"#1 Cyber [SEC]urity Sto[RY]  -  News &amp; Bug Bounty Story Collections\",\"publisher\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#organization\"},\"alternateName\":\"Security Story\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/secry.me\\\/explore\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#organization\",\"name\":\"#1 Cyber [SEC]urity Sto[RY] - News & Bug Bounty Story Collections\",\"alternateName\":\"SECRY\",\"url\":\"https:\\\/\\\/secry.me\\\/explore\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/secryweb.sirv.com\\\/WP_secry.me\\\/2022\\\/06\\\/cropped-SECRY.webp\",\"contentUrl\":\"https:\\\/\\\/secryweb.sirv.com\\\/WP_secry.me\\\/2022\\\/06\\\/cropped-SECRY.webp\",\"width\":512,\"height\":512,\"caption\":\"#1 Cyber [SEC]urity Sto[RY] - News & Bug Bounty Story Collections\"},\"image\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/secry.me\",\"https:\\\/\\\/pinterest.com\\\/secry_me\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#\\\/schema\\\/person\\\/a0dca9413073b143bfc0db687dd0b0d6\",\"name\":\"Christin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g\",\"caption\":\"Christin\"},\"description\":\"A cybersecurity practitioner with more than 5 years of experience in the cybersecurity world. Has an interest in creating simple blog websites, learning about SEO and graphic design, writing, AI, and understanding the concepts of journalism. Intentionally created this website to make the world of cybersecurity more engaging by combining it with journalistic principles and presenting cybersecurity stories that are easy to understand, which can help anyone who wants to develop in the cybersecurity world.\",\"sameAs\":[\"https:\\\/\\\/secry.me\\\/explore\"],\"url\":\"https:\\\/\\\/secry.me\\\/explore\\\/author\\\/secry\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Critical Zoom Vulnerability Allowed to Take Over Meetings and Infiltrate Zoom Tenants | SECRY","description":"A critical vulnerability in Zoom Room enabled malicious actors to take over control of meetings and pilfer confidential information. The Zoom","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/secry.me\/explore\/critical-zoom-vulnerability-allowed-to-take-over-meetings-and-infiltrate-zoom-tenants\/","og_locale":"en_US","og_type":"article","og_title":"Critical Zoom Vulnerability Allowed to Take Over Meetings and Infiltrate Zoom Tenants | SECRY","og_description":"A critical vulnerability in Zoom Room enabled malicious actors to take over control of meetings and pilfer confidential information. The Zoom","og_url":"https:\/\/secry.me\/explore\/critical-zoom-vulnerability-allowed-to-take-over-meetings-and-infiltrate-zoom-tenants\/","og_site_name":"SECRY","article_publisher":"https:\/\/www.facebook.com\/secry.me","article_published_time":"2023-12-01T04:02:02+00:00","article_modified_time":"2023-12-03T18:01:37+00:00","og_image":[{"width":1820,"height":1094,"url":"https:\/\/secryweb.sirv.com\/WP_secry.me\/2023\/12\/Zoom-Room-Vulnerability.jpg","type":"image\/jpeg"}],"author":"Christin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Christin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"NewsArticle","@id":"https:\/\/secry.me\/explore\/critical-zoom-vulnerability-allowed-to-take-over-meetings-and-infiltrate-zoom-tenants\/#article","isPartOf":{"@id":"https:\/\/secry.me\/explore\/critical-zoom-vulnerability-allowed-to-take-over-meetings-and-infiltrate-zoom-tenants\/"},"author":{"name":"Christin","@id":"https:\/\/secry.me\/explore\/#\/schema\/person\/a0dca9413073b143bfc0db687dd0b0d6"},"headline":"Critical Zoom Vulnerability Allowed to Take Over Meetings and Infiltrate Zoom Tenants","datePublished":"2023-12-01T04:02:02+00:00","dateModified":"2023-12-03T18:01:37+00:00","mainEntityOfPage":{"@id":"https:\/\/secry.me\/explore\/critical-zoom-vulnerability-allowed-to-take-over-meetings-and-infiltrate-zoom-tenants\/"},"wordCount":536,"commentCount":0,"publisher":{"@id":"https:\/\/secry.me\/explore\/#organization"},"image":{"@id":"https:\/\/secry.me\/explore\/critical-zoom-vulnerability-allowed-to-take-over-meetings-and-infiltrate-zoom-tenants\/#primaryimage"},"thumbnailUrl":"https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/12\/Zoom-Room-Vulnerability.jpg","keywords":["AppOmn","H1-4420","takeover","Threat","Zoom Room","Zoom Tenants","Zoom Vulnerability"],"articleSection":["Cyber Security","Hacker News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/secry.me\/explore\/critical-zoom-vulnerability-allowed-to-take-over-meetings-and-infiltrate-zoom-tenants\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/secry.me\/explore\/critical-zoom-vulnerability-allowed-to-take-over-meetings-and-infiltrate-zoom-tenants\/","url":"https:\/\/secry.me\/explore\/critical-zoom-vulnerability-allowed-to-take-over-meetings-and-infiltrate-zoom-tenants\/","name":"Critical Zoom Vulnerability Allowed to Take Over Meetings and Infiltrate Zoom Tenants | SECRY","isPartOf":{"@id":"https:\/\/secry.me\/explore\/#website"},"primaryImageOfPage":{"@id":"https:\/\/secry.me\/explore\/critical-zoom-vulnerability-allowed-to-take-over-meetings-and-infiltrate-zoom-tenants\/#primaryimage"},"image":{"@id":"https:\/\/secry.me\/explore\/critical-zoom-vulnerability-allowed-to-take-over-meetings-and-infiltrate-zoom-tenants\/#primaryimage"},"thumbnailUrl":"https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/12\/Zoom-Room-Vulnerability.jpg","datePublished":"2023-12-01T04:02:02+00:00","dateModified":"2023-12-03T18:01:37+00:00","description":"A critical vulnerability in Zoom Room enabled malicious actors to take over control of meetings and pilfer confidential information. The Zoom","breadcrumb":{"@id":"https:\/\/secry.me\/explore\/critical-zoom-vulnerability-allowed-to-take-over-meetings-and-infiltrate-zoom-tenants\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/secry.me\/explore\/critical-zoom-vulnerability-allowed-to-take-over-meetings-and-infiltrate-zoom-tenants\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secry.me\/explore\/critical-zoom-vulnerability-allowed-to-take-over-meetings-and-infiltrate-zoom-tenants\/#primaryimage","url":"https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/12\/Zoom-Room-Vulnerability.jpg","contentUrl":"https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/12\/Zoom-Room-Vulnerability.jpg","width":1820,"height":1094,"caption":"Illustration of Zoom Room Vulnerability - This is Zoom office lobby . Source: blog.zoom.us"},{"@type":"BreadcrumbList","@id":"https:\/\/secry.me\/explore\/critical-zoom-vulnerability-allowed-to-take-over-meetings-and-infiltrate-zoom-tenants\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/secry.me\/explore\/"},{"@type":"ListItem","position":2,"name":"Critical Zoom Vulnerability Allowed to Take Over Meetings and Infiltrate Zoom Tenants"}]},{"@type":"WebSite","@id":"https:\/\/secry.me\/explore\/#website","url":"https:\/\/secry.me\/explore\/","name":"SECRY","description":"#1 Cyber [SEC]urity Sto[RY]  -  News &amp; Bug Bounty Story Collections","publisher":{"@id":"https:\/\/secry.me\/explore\/#organization"},"alternateName":"Security Story","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/secry.me\/explore\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/secry.me\/explore\/#organization","name":"#1 Cyber [SEC]urity Sto[RY] - News & Bug Bounty Story Collections","alternateName":"SECRY","url":"https:\/\/secry.me\/explore\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secry.me\/explore\/#\/schema\/logo\/image\/","url":"https:\/\/secryweb.sirv.com\/WP_secry.me\/2022\/06\/cropped-SECRY.webp","contentUrl":"https:\/\/secryweb.sirv.com\/WP_secry.me\/2022\/06\/cropped-SECRY.webp","width":512,"height":512,"caption":"#1 Cyber [SEC]urity Sto[RY] - News & Bug Bounty Story Collections"},"image":{"@id":"https:\/\/secry.me\/explore\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/secry.me","https:\/\/pinterest.com\/secry_me"]},{"@type":"Person","@id":"https:\/\/secry.me\/explore\/#\/schema\/person\/a0dca9413073b143bfc0db687dd0b0d6","name":"Christin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g","caption":"Christin"},"description":"A cybersecurity practitioner with more than 5 years of experience in the cybersecurity world. Has an interest in creating simple blog websites, learning about SEO and graphic design, writing, AI, and understanding the concepts of journalism. Intentionally created this website to make the world of cybersecurity more engaging by combining it with journalistic principles and presenting cybersecurity stories that are easy to understand, which can help anyone who wants to develop in the cybersecurity world.","sameAs":["https:\/\/secry.me\/explore"],"url":"https:\/\/secry.me\/explore\/author\/secry\/"}]}},"_links":{"self":[{"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/posts\/4375","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/comments?post=4375"}],"version-history":[{"count":12,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/posts\/4375\/revisions"}],"predecessor-version":[{"id":4400,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/posts\/4375\/revisions\/4400"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/media\/4386"}],"wp:attachment":[{"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/media?parent=4375"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/categories?post=4375"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/tags?post=4375"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}