{"id":7632,"date":"2020-07-14T04:33:32","date_gmt":"2020-07-14T11:33:32","guid":{"rendered":"https:\/\/webdev.securin.xyz\/?p=7632"},"modified":"2023-07-10T14:29:39","modified_gmt":"2023-07-10T21:29:39","slug":"how-safe-are-online-conference-cyber-security","status":"publish","type":"post","link":"https:\/\/webdev.securin.xyz\/articles\/how-safe-are-online-conference-cyber-security\/","title":{"rendered":"How Safe are Online Conferences?"},"content":{"rendered":"\t\t
The usage of online conferencing applications increased exponentially early this year. Over 100 million new participants started using Zoom (despite its flaws) in March 2020. <\/strong><\/span><\/p>
Google Meet which was a paid application for G-suite users was made free to cater to the increasing online conferencing needs. LogMeIn Inc. declared ten times increase in their usage since March, this year.<\/p><\/blockquote>
With the recent breaches in Zoom application and increasing instances of \u2018zoombombing\u2019 and data theft, a definitive study of popular online video conferencing tools was needed.\u00a0In our recent white paper series<\/a>, we examined popular online conferencing applications <\/a>(Zoom, Logmein, Cisco, Teamviewer, Adobe, Microsoft, Polycom, Lifesize, Pexip) and has thrown the spotlight on the vulnerabilities that exist in it.<\/p>
Key Findings<\/strong><\/h3>
The report provides an in-depth study of popular online conference applications and their inherent vulnerabilities.\u00a0<\/p>
- A total of 877 vulnerabilities<\/li>
- 38<\/strong>\u00a0CVEs are weaponized<\/li>
- 10<\/strong>\u00a0CVEs are associated with RCE<\/li>
- 7<\/strong>\u00a0CVEs have Privilege Execution<\/li><\/ul><\/blockquote>
Vulnerabilities in Online Conferencing Applications<\/strong><\/h3>
The research team of Securin examined over 877<\/strong> <\/span>vulnerabilities that have been identified in the past decade (2010 \u2013 2020) out of which 38<\/span><\/strong> vulnerabilities have been weaponized and can be executed remotely. Out of the weaponized vulnerabilities, over 10<\/strong> <\/span>are associated with RCE (Remote Code Execution) and 7<\/strong> <\/span>with PE (Privilege Execution).<\/p><\/li><\/ul>
<\/p>
Out of the total vulnerabilities that exist in these applications, 220<\/strong> <\/span>are critical, while 55 <\/strong><\/span>are high and 521<\/strong> <\/span>in the medium level of priority, respectively.\u00a0<\/p><\/li><\/ul>
<\/p>
Vendor Vulnerability Count\u00a0<\/strong><\/h3>
Among the vendor who came under the lens, we find that Cisco has over 189<\/strong> <\/span>critical vulnerabilities.\u00a0<\/p><\/li>
Cisco leads the way with 418<\/strong> <\/span>vulnerabilities in total followed by Huawei with 325<\/strong> <\/span>vulnerabilities. Among the count of weaponized vulnerabilities, Polycom is high with over 13<\/strong> <\/span>vulnerabilities followed by Microsoft with 9<\/strong> <\/span>vulnerabilities. Worryingly, 7<\/strong><\/span> vulnerabilities in Polycom are associated with RCE.<\/p><\/li><\/ul>
<\/p>
In terms of weaponization trend, over 391<\/strong> <\/span>vulnerabilities were discovered in 2017. In general, the rate of weaponization of vulnerabilities has been high since 2015 and peaked during 2016.\u00a0<\/p>
<\/p>
The most alarming statistics of this report was that critical vulnerabilities in online conference tools are not being detected by popular scanners. \u00a0<\/p>
Count of vulnerabilities missed by Scanners<\/strong><\/span><\/p>