Apple is still pushing a silent update for macOS to address the vulnerability of the Mac webcam in RingCentral and Zhumu. These two apps are powered by Zoom, and it was discovered this week that they are also exposed to the same web server vulnerability as Zoom.
Sylvania HomeKit Light Strip
When the Zoom security was discovered last week, Apple pushed a silent MacOS update to remove the web server. Now, The Verge reports that Apple has deployed another silent security update to remove web servers installed by RingCentral and Zhumu. As the update pushed last week, it does not require any user interaction to install.
Earlier today, we explained that because RingCentral and Zhumu use the same underlying code as Zoom, they also installed their own web server in macOS. This web server makes it easy for users to participate in one-click meetings, but it also allows users to be exposed to webcam and microphone.
Unfortunately, RingCentral and Zhumu are not the only video conferencing apps that use Zoom's code. Apple says it hopes to re-open the vulnerability of all Zoom partner programs in the coming days.
Essentially, even when users uninstall video conferencing applications such as Zoom, RingCentral and Zhumu, the web server continues. This means that users without the app installed will not receive the updates distributed by the companies themselves, but still have the vulnerable web server on their Mac. This is why Apple has stepped in to completely remove the web servers.
Last week, Apple noted that it often "prints clear signature updates on Macs" to remove known malicious software, but rarely publicly takes action against a known app. Questions like these will only increase the incidence of physical webcam covers .
Subscribe to 9to5Mac on YouTube for more Apple News: