Friday, March 29, 2024

Microsoft: macOS ‘Powerdir’ Flaw Could Enable Access to User Data

The vulnerability could allow an attacker to bypass the macOS Transparency, Consent, and Control measures to access a user’s protected data

Microsoft today disclosed a vulnerability in Apple’s macOS that could enable an attacker to gain unauthorized access to protected user data through bypassing the Transparency, Consent, and Control (TCC) technology in the operating system.

The Microsoft Security Vulnerability Research (MSVR) team reported its discovery to Apple’s product security team on July 15, 2021. Apple addressed CVE-2021-30970, dubbed “Powerdir”, in a rollout of security updates released on Dec. 13.

TCC is an Apple subsystem introduced in 2012 in macOS Mountain Lion. The technology was designed to help users configure the privacy settings of their device’s applications; for example, access to the camera or microphone, or their calendar or iCloud account. To secure TCC, Apple created a feature that prevents unauthorized code execution and enforced a policy that limited TCC access only to applications with full disk access.

The vulnerability Microsoft found would allow adversaries to work around this feature and launch an attack on a macOS device. Microsoft confirms this has not been exploited in the wild, and it only affects macOS. iOS devices are not affected. 

When an app requests access to protected user data, one of two actions can occur: if the app and request type has a record in the TCC databases, then a flag in the database entry says whether the request should be allowed or denied without user interaction. If they do not have a record, the user is prompted to grant or deny access.

Recommended:  LEAKED docs from China ‘show country LIED to the world about Coronavirus

Researchers learned it’s possible to programmatically change a target’s home directory and plant a fake TCC database, which stores the consent history of app requests, wrote Jonathan Bar Or, with the Microsoft 365 Defender Research Team, in a blog post on the findings. If exploited on an unpatched system, this flaw could let an attacker to potentially conduct an attack based on the victim’s protected personal data, Or wrote.

“For example, the attacker could hijack an app installed on the device—or install their own malicious app—and access the microphone to record private conversations or capture screenshots of sensitive information displayed on the user’s screen,” he explained.

This is the latest in a string of TCC vulnerabilities Apple has patched in recent years. Last year, Apple patched CVE-2021-30713, a flaw that allowed attackers to bypass TCC protections to deliver XCSSET malware. Once on a machine, XCSSET used the bypass to take screenshots of the user’s desktop without needing permissions, report Jamf researchers who discovered the bug.

The year prior, other reported vulnerabilities related to TCC bypass included CVE-2020-9771 and CVE-2020-9934. Apple’s fix for the latter caught Microsoft’s attention, and in the team’s analysis, they discovered an exploit an attacker could use to change settings on any application. After it disclosed its findings to Apple, a similar bypass was presented in a Black Hat USA talk. However, Microsoft’s exploit continued to work after Apple fixed a similar vulnerability.

Researchers did have to make changes to their proof-of-concept after the October release of macOS Monterey, which made changes in how the dsimport tool works and rendered it’s initial PoC exploit ineffective.

Recommended:  How to Run Threat Intelligence Analysis and Malware Research (Without Spending a Dime)

“This shows that even as macOS or other operating systems and applications become more hardened with each release, software vendors like Apple, security researchers, and the larger security community, need to continuously work together to identify and fix vulnerabilities before attackers can take advantage of them,” Or wrote.

source

Bookmark
ClosePlease login
Share the word, let's increase Cybersecurity Awareness as we know it
- Sponsored -

Sponsored Offer

Unleash the Power of the Cloud: Grab $200 Credit for 60 Days on DigitalOcean!

Digital ocean free 200

Discover more infosec

User Avatar
Steven Black (n0tst3)
Hello! I'm Steve, an independent security researcher, and analyst from Scotland, UK. I've had an avid interest in Computers, Technology and Security since my early teens. 20 years on, and, it's a whole lot more complicated... I've assisted Governments, Individuals and Organizations throughout the world. Including; US DOJ, NHS UK, GOV UK. I'll often reblog infosec-related articles that I find interesting. On the RiSec website, You'll also find a variety of write-ups, tutorials and much more!

more infosec reads

Subscribe for weekly updates

explore

more

security