image of this article category

Microsoft warns Mac users of a security vulnerability

13.01.2022 05:16 AM
Microsoft warns Mac users of a security vulnerability
dooklik website logo
share this article on facebook
share this article on twitter
share this article on whatsapp
share this article on facebook messenger
Microsoft warns Mac users of a security vulnerability
Microsoft is warning Mac users not to upgrade to the latest version of macOS Monterey after it discovered a vulnerability in Apple's Transparency, Approval and Control (TCC) feature.

Exploiting this vulnerability could allow malicious actors to forge anti-terror code, plant malware, or take over another application on your computer.

Introduced in 2012 with macOS Mountain Lion, TCC is designed to help control an app's access to things like your camera, microphone, and data.

When an application requests access to protected data, the request is compared to records stored in a private database. And if the records exist, the application will be denied or access granted based on a flag indicating the level of access reported by The Verege.

Otherwise, a prompt is shown to the user to explicitly grant or deny access. Once the user responds, that request is stored in the database and future requests will follow the user's previous input.

According to Microsoft, the "powerdir" vulnerability, also known as CVE-2021-30970, has been exploited twice by security researchers. The first "proof of concept" exploit essentially implanted a fake TCC database file and changed the user's home directory.

By doing this, Microsoft was able to change the settings in any app or enable access to the microphone or camera. Microsoft was unobtrusively able to give Teams the microphone and the camera. Microsoft reported these preliminary results to Apple in July 2021, although the exploit appears to be still working, despite Apple fixing a similar exploit shown at Black Hat 2021.

The second proof of concept of the exploit came because a change in the dsimport tool for macOS Monterey broke the first vulnerability. This new exploit allows an attacker to use code injection to alter a binary called /usr/libexec/configd. This duo is responsible for making system-wide changes, including accessing the TCC database. This allowed Microsoft to silently change the home directory and perform the same type of attack as the first exploit.

Fortunately Microsoft notified Apple again of the vulnerability, and it was patched last month. Microsoft urges macOS users to make sure their version of macOS Monterey is updated with the latest patch. The company also took the time to promote its Defender for Endpoint enterprise security solution, which was able to prevent these vulnerabilities even before Apple patched them.
Related Articles
doolik website logo
After being criticized for its AI policy, Microsoft has made it clear how it intends to maintain its ethical responsibility for the technology.
doolik website logo
Microsoft launched ChatGPT's new AI-powered Bing search engine last month, and it seems to have caught the world's attention. Before confirming on Tuesday that the new Bing search engine is powered by OpenAI's recently released GPT-4.

doolik website logo
The “Tik Tok” platform announced on Wednesday that, starting this year, the data of its users will be stored in three centers, two of which are in Ireland and one in Norway, to reassure European public authorities that have expressed a lack of confidence in them.
Live Video Streaming
Live video streaming lets you engage with your audience in real time with a video feed. Broadcast your daily show to your audience with no limits, no buffering and high quality videos. Reach all devices anytime anywhere with different video qualities that suits any device and any connection.
The website uses cookies to improve your experience. We’ll assume you’re ok with this, but you can opt-out if you wish.