Microsoft security researchers found a macOS exploit that can alter TCC permissions

Why it matters: On Monday, Microsoft publicly disclosed a vulnerability in macOS that could be used to access or exfiltrate sensitive user data. The exploit is facilitated by a flaw in the Transparency, Consent, and Control (TCC) framework. The TCC platform is part of macOS that allows users to control what apps can access users’ data, files, and components.

Microsoft 365 Defender Research Team dubbed the vulnerability (CVE-2021-30970) “powerdir” named after the software exploit created by Microsoft researcher Jonathan Bar Or. Microsoft notified Cupertino of the security flaw in July 2021. Apple patched the flaw in December with macOS 11.6 and 12.1.

“We discovered that it is possible to programmatically change a target user’s home directory and plant a fake TCC database, which stores the consent history of app requests,” explained Or. “If exploited on unpatched systems, this vulnerability could allow a malicious actor to potentially orchestrate an attack based on the user’s protected personal data.”

Screenshots show the program granting Or access to both the microphone and camera. However, the TCC also maintains permission for other components, including screen recording, Bluetooth, location services, contacts, photos, and more.

While Microsoft created the software specifically for this task, any app could use the same technique to exploit the hole. The attacker needs full disk access to the TCC database, which could be granted via other methods. Once gained, hackers can assign or reassign access permissions as they please.

Powerdir is the third TCC bypass found in the last couple of years. The other two (CVE-2020-9934 and CVE-2020-27937) were disclosed and patched in 2020. Another flaw (CVE-2021-30713) found last year in all Apple operating systems allowed attackers arbitrary control over permissions, which hackers actively exploited before being fixed in May.

Note: This article have been indexed to our site. We do not claim legitimacy, ownership or copyright of any of the content above. To see the article at original source Click Here

Related Posts
Ryan Reynolds’ Maximum Effort is part of an upcoming 1.2 million-square-foot studio in Markham thumbnail

Ryan Reynolds’ Maximum Effort is part of an upcoming 1.2 million-square-foot studio in Markham

The space is being described as a fully integrated production studio for film, scripted and unscripted reality television, drama series, live-action, and animated feature films Canada’s own Ryan Reynolds, alongside his production and advertising company Maximum Effort, is set to establish a new 1.2 million-square-foot studio in Canada. Maximum Effort, which Reynolds co-founded with George
Read More
The Best Gaming Notebooks thumbnail

The Best Gaming Notebooks

Reviews, News, CPU, GPU, Articles, Columns, Other "or" search relation.3D Printing, 5G, Accessory, AI, Alder Lake, AMD, Android, Apple, ARM, Audio, Biotech, Business, Camera, Cannon Lake, Cezanne (Zen 3), Charts, Chinese Tech, Chromebook, Coffee Lake, Comet Lake, Console, Convertible / 2-in-1, Cryptocurrency, Cyberlaw, Deal, Desktop, E-Mobility, Education, Exclusive, Fail, Foldable, Gadget, Galaxy Note, Galaxy S,…
Read More
This devious macOS malware is evading capture by using Apple's own encryption thumbnail

This devious macOS malware is evading capture by using Apple’s own encryption

(Image credit: Shutterstock / Kanoktuch) Security researchers from Check Point Research recently find new variant of Banshee malwareThe new variant uses encryption that allows it to blend with regular macOS operationsThe campaign went unabated for two monthsCybersecurity researchers from Check Point Research recently uncovered a new version of the Banshee infostealer, capable of bypassing Apple’s
Read More
Singapore uncovers four critical vulnerabilities in Riverbed software thumbnail

Singapore uncovers four critical vulnerabilities in Riverbed software

Singapore's Cyber Security Group, an agency charged with securing the nation's cyberspace, has uncovered four critical flaws in code from network software company Riverbed. The vulnerable application is SteelCentral AppInternals, formerly referred to as AppInternals Xpert, provided by Riverbed's Aternity division. AppInternals provides application performance monitoring and diagnostics, and is part of SteelCentral. Customers usually…
Read More
Index Of News