{"id":1347,"date":"2021-03-19T15:39:02","date_gmt":"2021-03-19T10:09:02","guid":{"rendered":"https:\/\/xiarch.com\/blog\/?p=1347"},"modified":"2021-06-07T11:11:43","modified_gmt":"2021-06-07T05:41:43","slug":"zoom-screen-sharing-bug-authorize-the-users-to-get-access-on-restricted-applications","status":"publish","type":"post","link":"https:\/\/xiarch.com\/blog\/zoom-screen-sharing-bug-authorize-the-users-to-get-access-on-restricted-applications\/","title":{"rendered":"Zoom Screen-Sharing Bug Authorize the Users to Get Access on Restricted Applications!"},"content":{"rendered":"\n<p><p style=\"text-align: justify\">Another vulnerability was discovered in Zoom\u2019s screen sharing feature that enables the attackers to leak confidential information while the user is busy on the calls.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">This vulnerability is tracked as CVE-2021-28133 and this unpatched vulnerability makes it possible to reveal the application content that has not to be shared briefly and make it very harder to exploit and becoming wild.<\/p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How this All Started?<\/strong><\/h2>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"679\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/03\/zoom-screen-share-bug-image1-1024x679.jpg\" alt=\"Zoom Screen-Sharing Bug Authorize the Users to Get Access on Restricted Applications!\" class=\"wp-image-1352\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/03\/zoom-screen-share-bug-image1-1024x679.jpg 1024w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/03\/zoom-screen-share-bug-image1-300x199.jpg 300w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/03\/zoom-screen-share-bug-image1-768x509.jpg 768w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/03\/zoom-screen-share-bug-image1.jpg 1199w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<p><p style=\"text-align: justify\">The Screen Sharing function of Zoom permits the attackers to share the entire desktop or phone screen and also have the capabilities while sharing one-or-more application portion to the others.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">However, while sharing the screen any other application overlaps it and leaks the data present in the shared screen for a short period.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">According to the security experts, when a user shares the specific screen using the Zoom share screen feature then the other participants will able to see the detailed content available on the shared screen and they can see the data of other screens that haven\u2019t been shared by the user. This is possible because while sharing the screen, the application also displays all the screens available for an instance, and then the other screens are also captured by the other users as they started overlaps the shared screens.<\/p><\/p>\n\n\n\n<iframe loading=\"lazy\" width=\"730\" height=\"441\" src=\"https:\/\/www.youtube.com\/embed\/SonmmgQlLzg\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen=\"\"><\/iframe>\n\n\n\n<p><p style=\"text-align: justify\">This vulnerability was tested on the version of 5.5.4 and 5.4.3 in both Windows and Linux operating systems. The officials also said they know about this threat and they are executing the security updates from December 2020, but nothing can be fixed in that period. The vulnerability is getting more complicated day by day.<\/p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Summering Up<\/strong><\/h2>\n\n\n\n<p><p style=\"text-align: justify\">This entire attack has serious consequences that depend on the nature of data leaked and shared by the users. The security experts also said that some other malicious participants take the advantage of this vulnerability and they misuse the confidential information while recording or sharing the screen and view the private information.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">The experts also informed Zoom about this serious issue and they are working and finding the appropriate resolutions for the users while protecting their data and privacy.<\/p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Another vulnerability was discovered in Zoom\u2019s screen sharing feature that enables the attackers to leak confidential information while the user is busy on the calls. This vulnerability is tracked as CVE-2021-28133 and this unpatched vulnerability makes it possible to reveal the application content that has not to be shared briefly and make it very harder [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":1351,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[6],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.11 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Zoom Screen-Sharing Bug Authorize the Users to Get Access on Restricted Applications! - Xiarch Solutions Private Limited<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xiarch.com\/blog\/zoom-screen-sharing-bug-authorize-the-users-to-get-access-on-restricted-applications\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Zoom Screen-Sharing Bug Authorize the Users to Get Access on Restricted Applications! - Xiarch Solutions Private Limited\" \/>\n<meta property=\"og:description\" content=\"Another vulnerability was discovered in Zoom\u2019s screen sharing feature that enables the attackers to leak confidential information while the user is busy on the calls. This vulnerability is tracked as CVE-2021-28133 and this unpatched vulnerability makes it possible to reveal the application content that has not to be shared briefly and make it very harder [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xiarch.com\/blog\/zoom-screen-sharing-bug-authorize-the-users-to-get-access-on-restricted-applications\/\" \/>\n<meta property=\"og:site_name\" content=\"Xiarch Solutions Private Limited\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/xiarch\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-19T10:09:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-07T05:41:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/03\/zoom-screen-share-bug-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"728\" \/>\n\t<meta property=\"og:image:height\" content=\"380\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Xiarch Security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xiarch\" \/>\n<meta name=\"twitter:site\" content=\"@xiarch\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xiarch Security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/xiarch.com\/blog\/zoom-screen-sharing-bug-authorize-the-users-to-get-access-on-restricted-applications\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/xiarch.com\/blog\/zoom-screen-sharing-bug-authorize-the-users-to-get-access-on-restricted-applications\/\"},\"author\":{\"name\":\"Xiarch Security\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c\"},\"headline\":\"Zoom Screen-Sharing Bug Authorize the Users to Get Access on Restricted Applications!\",\"datePublished\":\"2021-03-19T10:09:02+00:00\",\"dateModified\":\"2021-06-07T05:41:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/xiarch.com\/blog\/zoom-screen-sharing-bug-authorize-the-users-to-get-access-on-restricted-applications\/\"},\"wordCount\":352,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\"},\"articleSection\":[\"Vulnerabilities\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/xiarch.com\/blog\/zoom-screen-sharing-bug-authorize-the-users-to-get-access-on-restricted-applications\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/xiarch.com\/blog\/zoom-screen-sharing-bug-authorize-the-users-to-get-access-on-restricted-applications\/\",\"url\":\"https:\/\/xiarch.com\/blog\/zoom-screen-sharing-bug-authorize-the-users-to-get-access-on-restricted-applications\/\",\"name\":\"Zoom Screen-Sharing Bug Authorize the Users to Get Access on Restricted Applications! - Xiarch Solutions Private Limited\",\"isPartOf\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#website\"},\"datePublished\":\"2021-03-19T10:09:02+00:00\",\"dateModified\":\"2021-06-07T05:41:43+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/xiarch.com\/blog\/zoom-screen-sharing-bug-authorize-the-users-to-get-access-on-restricted-applications\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/xiarch.com\/blog\/zoom-screen-sharing-bug-authorize-the-users-to-get-access-on-restricted-applications\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/xiarch.com\/blog\/zoom-screen-sharing-bug-authorize-the-users-to-get-access-on-restricted-applications\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/xiarch.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Zoom Screen-Sharing Bug Authorize the Users to Get Access on Restricted Applications!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/xiarch.com\/blog\/#website\",\"url\":\"https:\/\/xiarch.com\/blog\/\",\"name\":\"Xiarch Solutions Private Limited\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/xiarch.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\",\"name\":\"Xiarch\",\"url\":\"https:\/\/xiarch.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png\",\"contentUrl\":\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png\",\"width\":300,\"height\":300,\"caption\":\"Xiarch\"},\"image\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/xiarch\/\",\"https:\/\/twitter.com\/xiarch\",\"https:\/\/www.linkedin.com\/company\/xiarch\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c\",\"name\":\"Xiarch Security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g\",\"caption\":\"Xiarch Security\"},\"sameAs\":[\"https:\/\/xiarch.com\/blog\/\"],\"url\":\"https:\/\/xiarch.com\/blog\/author\/vector\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Zoom Screen-Sharing Bug Authorize the Users to Get Access on Restricted Applications! - Xiarch Solutions Private Limited","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xiarch.com\/blog\/zoom-screen-sharing-bug-authorize-the-users-to-get-access-on-restricted-applications\/","og_locale":"en_US","og_type":"article","og_title":"Zoom Screen-Sharing Bug Authorize the Users to Get Access on Restricted Applications! - Xiarch Solutions Private Limited","og_description":"Another vulnerability was discovered in Zoom\u2019s screen sharing feature that enables the attackers to leak confidential information while the user is busy on the calls. This vulnerability is tracked as CVE-2021-28133 and this unpatched vulnerability makes it possible to reveal the application content that has not to be shared briefly and make it very harder [&hellip;]","og_url":"https:\/\/xiarch.com\/blog\/zoom-screen-sharing-bug-authorize-the-users-to-get-access-on-restricted-applications\/","og_site_name":"Xiarch Solutions Private Limited","article_publisher":"https:\/\/www.facebook.com\/xiarch\/","article_published_time":"2021-03-19T10:09:02+00:00","article_modified_time":"2021-06-07T05:41:43+00:00","og_image":[{"width":728,"height":380,"url":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/03\/zoom-screen-share-bug-image.jpg","type":"image\/jpeg"}],"author":"Xiarch Security","twitter_card":"summary_large_image","twitter_creator":"@xiarch","twitter_site":"@xiarch","twitter_misc":{"Written by":"Xiarch Security","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xiarch.com\/blog\/zoom-screen-sharing-bug-authorize-the-users-to-get-access-on-restricted-applications\/#article","isPartOf":{"@id":"https:\/\/xiarch.com\/blog\/zoom-screen-sharing-bug-authorize-the-users-to-get-access-on-restricted-applications\/"},"author":{"name":"Xiarch Security","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c"},"headline":"Zoom Screen-Sharing Bug Authorize the Users to Get Access on Restricted Applications!","datePublished":"2021-03-19T10:09:02+00:00","dateModified":"2021-06-07T05:41:43+00:00","mainEntityOfPage":{"@id":"https:\/\/xiarch.com\/blog\/zoom-screen-sharing-bug-authorize-the-users-to-get-access-on-restricted-applications\/"},"wordCount":352,"commentCount":0,"publisher":{"@id":"https:\/\/xiarch.com\/blog\/#organization"},"articleSection":["Vulnerabilities"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/xiarch.com\/blog\/zoom-screen-sharing-bug-authorize-the-users-to-get-access-on-restricted-applications\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/xiarch.com\/blog\/zoom-screen-sharing-bug-authorize-the-users-to-get-access-on-restricted-applications\/","url":"https:\/\/xiarch.com\/blog\/zoom-screen-sharing-bug-authorize-the-users-to-get-access-on-restricted-applications\/","name":"Zoom Screen-Sharing Bug Authorize the Users to Get Access on Restricted Applications! - Xiarch Solutions Private Limited","isPartOf":{"@id":"https:\/\/xiarch.com\/blog\/#website"},"datePublished":"2021-03-19T10:09:02+00:00","dateModified":"2021-06-07T05:41:43+00:00","breadcrumb":{"@id":"https:\/\/xiarch.com\/blog\/zoom-screen-sharing-bug-authorize-the-users-to-get-access-on-restricted-applications\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xiarch.com\/blog\/zoom-screen-sharing-bug-authorize-the-users-to-get-access-on-restricted-applications\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/xiarch.com\/blog\/zoom-screen-sharing-bug-authorize-the-users-to-get-access-on-restricted-applications\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/xiarch.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Zoom Screen-Sharing Bug Authorize the Users to Get Access on Restricted Applications!"}]},{"@type":"WebSite","@id":"https:\/\/xiarch.com\/blog\/#website","url":"https:\/\/xiarch.com\/blog\/","name":"Xiarch Solutions Private Limited","description":"","publisher":{"@id":"https:\/\/xiarch.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xiarch.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/xiarch.com\/blog\/#organization","name":"Xiarch","url":"https:\/\/xiarch.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png","contentUrl":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png","width":300,"height":300,"caption":"Xiarch"},"image":{"@id":"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/xiarch\/","https:\/\/twitter.com\/xiarch","https:\/\/www.linkedin.com\/company\/xiarch"]},{"@type":"Person","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c","name":"Xiarch Security","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g","caption":"Xiarch Security"},"sameAs":["https:\/\/xiarch.com\/blog\/"],"url":"https:\/\/xiarch.com\/blog\/author\/vector\/"}]}},"_links":{"self":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/1347"}],"collection":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/comments?post=1347"}],"version-history":[{"count":5,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/1347\/revisions"}],"predecessor-version":[{"id":1354,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/1347\/revisions\/1354"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/media\/1351"}],"wp:attachment":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/media?parent=1347"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/categories?post=1347"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/tags?post=1347"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}