Skip to main content

Apple pushes silent macOS update to remove web server secretly installed by Zoom

Earlier this week, a security researcher detailed how the Zoom video conferencing app installed a hidden web server on Macs, leaving users vulnerable to having their webcams hijacked. Now, TechCrunch reports that Apple has pushed a silent update to macOS to remove that hidden web server.

Apple confirmed to TechCrunch that it did in fact push the silent update to Mac users, and that the update does not require any user interaction to install. The purpose of the update is to remove the web server installed by Zoom.

Apple often pushes silent signature updates to Macs to thwart known malware — similar to an anti-malware service — but it’s rare for Apple to take action publicly against a known or popular app. The company said it pushed the update to protect users from the risks posed by the exposed web server.

Zoom said that it installed the web server to allow users to join Zoom meetings with one click. That web server, however, is what left Zoom users vulnerable to having their web cams and microphones hijacked, as detailed by a security researcher on Monday. Zoom initially refuted several details of the claim, but it eventually back tracked and said that it would release a series of updates to the Zoom app on Mac to close the vulnerability.

Apple, however, seemingly took things into its own hands instead, in an effort to protect users. Because Zoom installed the web server, the vulnerability also affected users who had gone as far as to uninstall the Zoom app completely. This is seemingly why Apple felt the need to silently remove the web server to protect users.

Zoom said that it is “happy” to have worked with Apple on the update:

Zoom spokesperson Priscilla McCarthy told TechCrunch: “We’re happy to have worked with Apple on testing this update. We expect the web server issue to be resolved today. We appreciate our users’ patience as we continue to work through addressing their concerns.”

Read more about the original vulnerability here.

FTC: We use income earning auto affiliate links. More.

Hyper Cube automatic iPhone backups
You’re reading 9to5Mac — experts who break news about Apple and its surrounding ecosystem, day after day. Be sure to check out our homepage for all the latest news, and follow 9to5Mac on Twitter, Facebook, and LinkedIn to stay in the loop. Don’t know where to start? Check out our exclusive stories, reviews, how-tos, and subscribe to our YouTube channel

Subscribe to 9to5Mac on YouTube for more Apple news:

Comments

Author

Avatar for Chance Miller Chance Miller

Chance is an editor for the entire 9to5 network and covers the latest Apple news for 9to5Mac.

Tips, questions, typos to chance@9to5mac.com

Manage push notifications

notification icon
We would like to show you notifications for the latest news and updates.
notification icon
Please wait...processing
notification icon
We would like to show you notifications for the latest news and updates.
notification icon
Please wait...processing