![]() ![]() ![]() Writing on 0patch’s disclosure blog, Kolsek said that analysis of the zero-day had shown it is only exploitable on Windows 7 (and older systems), which is now out of support, although millions of consumer and enterprise users are still prolonging their use of it. According to Mitja Kolsek of 0patch, a platform designed to distribute microscopic patches to running systems – who was informed of the vulnerability by an independent researcher who wants to remain anonymous – the vulnerability would let a remote attacker execute arbitrary code on their target’s PC if the Zoom Client for Windows was installed on it – typically by getting them to open a malicious file attachment. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |