

Save the installation file, "ZoomInstaller.exe", to a place on your computer where you can find it.Click on the Download button for Zoom Client for Meetings.Open a browser and navigate to the following web address:.This client allows you start new meetings, join existing meetings, schedule meetings, chat with contacts, and more. If you would like to install the desktop client for Zoom on a Windows machine, follow the steps below. Verify that the file is coming from “Zoom Video Communications, Inc.” then click “Run” again:.You may need to agree to “Run” the installation file as shown in the picture above.When you join a meeting, you will see a screen that says, “A download should start automatically in a few seconds.”.Please note that installing the web client will ALSO install the desktop client. This client will need to be installed for each browser (in other words, if you install the client for Chrome, but then the next day use Firefox, you will need to install the client again). This is how most people will access zoom. Minus the root access, of course.You will be prompted to install the web client for Zoom when you join a Zoom meeting for the first time. Hackers can take advantage of exposed Zoom vulnerabilities quickly, Goodin noted, if Zoom users aren't updated right away. Ars' Dan Goodin noted that his Zoom client didn't actually update when the fix for that issue arrived, requiring a manual download of an intermediate version first. Last May, a Zoom vulnerability that enabled a zero-click remote code execution used a similar downgrade and signature-check bypass. Prior to that, Zoom was caught running an entire undocumented web server on Macs, causing Apple to issue its own silent update to kill the server. Wardle previously revealed a Zoom vulnerability that let attackers steal Windows credentials by sending a string of text. The company settled with the FTC in 2020 after admitting that it lied for years about offering end-to-end encryption. Zoom's software security record is spotty-and at times, downright scary.

( Update: Clarified Wardle's disclosure and update timing). You can download the update directly from Zoom or click on your menu bar options to "Check for updates." We wouldn't suggest waiting for an automatic update, for multiple reasons.

Zoom issued a security bulletin later that same day, and a patch for version Zoom 5.11.5 (9788) followed soon after. Wardle disclosed his findings to Zoom before his talk, and some aspects of the vulnerability were addressed, but key root access was still available as of Wardle's talk on Saturday.
