Zoom web client flaw could’ve let hackers crack meetings passcode

Zoom web client flaw could’ve let hackers crack meetings passcode

The vulnerability, if exploited, would have affected millions of Zoom users – There are more than 13 million Zoom users worldwide.


A majority of people are forced to work from home in the wake of the COVID-19 pandemic-led lockdown worldwide. This prompted an unprecedented increase in the use of video conferencing apps like Zoom and Microsoft Teams.


As more and more people are turning to Zoom and using it regularly, the app’s security issues are getting highlighted as well. One such flaw was identified recently that could have let an attacker decode the numeric passcode using which people could conduct private meetings securely.



One of the Zoom meetings in which hackers yelled profanities and projected x-rated images on-screen during the Valley Transportation Authority Board of Directors’ video meeting in April 2020.



It is worth noting that Zoom introduced the passcode requirement back in April to provide a secure environment for holding private meetings and prevent the risk of Zoom-bombing. Since April, Zoom meetings, by default, are protected by a 6-digit numeric passcode.

According to the findings of SearhPilot’s VP Product, Tom Anthony, due to a vulnerability in Zoom web client, an attacker can gain access to password-protected private meetings of Zoom users. This can be possible if the attacker tries all the 1 million passwords, which can be done ..

Support the originator by clicking the read the rest link below.