A team of researchers from various companies has analyzed Electron-based desktop applications and ended up discovering vulnerabilities in several widely used pieces of software.
Electron is a free and open source framework for developing cross-platform desktop applications. It has been used to build some very popular applications, including Microsoft Teams, WhatsApp, and Slack.
The research project targeting Electron apps has been dubbed ElectroVolt and the findings were presented last week at the Black Hat conference.
Mohan Sri Rama Krishna Pedhapati, a security consultant at Cure53 and one of the researchers involved in the project, told SecurityWeek that they have identified vulnerabilities in 18 applications. Impacted vendors have been informed and they all released patches.
Security holes have been found in Microsoft Teams, Discord, Visual Studio Code, Basecamp, Mattermost, Element, Notion, JupyterLab, and Rocket.Chat, among others.
Nearly all of the exploits, many of which involve chaining several flaws, can lead to remote code execution on the targeted system. In Microsoft Teams, the white hat hackers found a local file read issue.
In many cases, minimal user interaction is required to trigger the exploits, such as clicking on a link or simply accessing a certain section of the application. The researchers said an attack is likely to have a high success rate as users will often click on things and open messages in Electron apps.
A majority of the flaws have been rated ‘critical’ and the researchers earned a total of approximately $60,000 for disclosing them to their respective vendors.
In addition to detailing their findings at Black Hat, the researchers published individual blog posts describing some of the Electrovolt vulnerabilities. Proof-of-concept (PoC) code and videos showing some of the exploits in action are also available.
Related: Code Execution Flaw in Electron Framework Could Affect Many Apps
Related: Windows URI Handling Flaw Leads to Drive-by Code Execution
Related: Vulnerability in WhatsApp Desktop Exposed User Files
Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- New Russia-Linked CosmicEnergy ICS Malware Could Disrupt Electric Grids
- Drop in Insider Breaches Drives Decline in Intrusions at OT Organizations
- Zero-Day Vulnerability Exploited to Hack Barracuda Email Security Gateway Appliances
- OAuth Vulnerabilities in Widely Used Expo Framework Allowed Account Takeovers
- New Honeywell OT Cybersecurity Solution Helps Identify Vulnerabilities, Threats
- Rheinmetall Says Military Business Not Impacted by Ransomware Attack
- Dish Ransomware Attack Impacted Nearly 300,000 People
- Samsung Smartphone Users Warned of Actively Exploited Vulnerability
Latest News
- Memcyco Raises $10 Million in Seed Funding to Prevent Website Impersonation
- New Russia-Linked CosmicEnergy ICS Malware Could Disrupt Electric Grids
- Security Pros: Before You Do Anything, Understand Your Threat Landscape
- Major Massachusetts Health Insurer Hit by Ransomware Attack, Member Data May Be Compromised
- Apria Healthcare Notifying 2 Million People of Years-Old Data Breaches
- European Cybersecurity Firm Sekoia.io Raises $37.5 Million
- Today’s Cyber Defense Challenges: Complexity and a False Sense of Security
- Drop in Insider Breaches Drives Decline in Intrusions at OT Organizations

