Mac Zoom software vulnerability
July 19, 2019
If you use Zoom (or one of its white-label products RingCentral or Zhumu) on your Mac, you may have already been prompted to update your software. If you鈥檙e not sure, and would like to test for this vulnerability, follow these steps:
- Open the 鈥淭erminal鈥 application
- Enter the following command: lsof -i :19421
- Press return/enter
If that command returns nothing but a new line, your system is OK. However, your system is vulnerable and needs to be updated if that command returns an output similar to this:
COMMAND PID USER FD TYPE DEVICE SIZE/OFF NODE NAME
ZoomOpene 1471 ksf1 3u IPv4 0x6ad96503eb75625 0t0 TCP localhost:19421 (LISTEN)
How to update Mac Zoom:
- Navigate to your Applications folder and select 鈥渮oom.us鈥
- Double-click to open it
- As the software launches, it should prompt you for an update
- Click 鈥淯pdate now鈥
If it doesn't prompt you automatically, and you鈥檇 like to check for updates, go to the Zoom menu and select File, then Check for Updates.
Zoom on other operating systems
Zoom users on other platforms may also be vulnerable if your browser automatically opens the software without asking. Improve online safety by updating your browser regularly.
For more information and assistance, contact your local OIT service desk.