![]() ![]() If you're running Windows 10 Pro (or Enterprise), the easiest way to prevent the credential leak vulnerability while using Zoom is using the Local Group Policy Editor. How to fix Zoom sign in credential leak using Group Policy ![]() How to fix Zoom sign in credential leak using Registry.How to fix Zoom sign in credential leak using Group Policy.In this Windows 10 guide, we'll walk you through the steps to temporarily fix the security vulnerability that could allow attackers to obtain your device sign-in credentials until there's a permanent fix. In addition to someone stealing your credentials, malicious individuals can also use this vulnerability to launch applications on the local device when the link is actioned. When this happens, the system will also send your sign-in name and NT Lan Manager (NTLM) credential hash.Īlthough the hash containing your username and password are not sent in clear-text, the information can be quickly obtained within seconds using many tools freely available online. If anyone clicks the link, Windows 10 (or another version) will try to connect to a remote host using the Server Message Block (SMB) network file-sharing protocol. ![]() ![]() The only caveat is that if you send a Universal Naming Convention (UNC) path (for example, \\192.1.1.112\file-sharing-folder), Zoom will also convert the path into an actionable link. VPN Deals: Lifetime license for $16, monthly plans at $1
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |