image of this article category

Microsoft warns Mac users of a security vulnerability

13.01.2022 05:16 AM
Latest
Microsoft warns Mac users of a security vulnerability
dooklik website logo
share
share this article on facebook
share this article on twitter
share this article on whatsapp
share this article on facebook messenger
Microsoft warns Mac users of a security vulnerability
Microsoft is warning Mac users not to upgrade to the latest version of macOS Monterey after it discovered a vulnerability in Apple's Transparency, Approval and Control (TCC) feature.

Exploiting this vulnerability could allow malicious actors to forge anti-terror code, plant malware, or take over another application on your computer.

Introduced in 2012 with macOS Mountain Lion, TCC is designed to help control an app's access to things like your camera, microphone, and data.

When an application requests access to protected data, the request is compared to records stored in a private database. And if the records exist, the application will be denied or access granted based on a flag indicating the level of access reported by The Verege.

Otherwise, a prompt is shown to the user to explicitly grant or deny access. Once the user responds, that request is stored in the database and future requests will follow the user's previous input.

According to Microsoft, the "powerdir" vulnerability, also known as CVE-2021-30970, has been exploited twice by security researchers. The first "proof of concept" exploit essentially implanted a fake TCC database file and changed the user's home directory.

By doing this, Microsoft was able to change the settings in any app or enable access to the microphone or camera. Microsoft was unobtrusively able to give Teams the microphone and the camera. Microsoft reported these preliminary results to Apple in July 2021, although the exploit appears to be still working, despite Apple fixing a similar exploit shown at Black Hat 2021.

The second proof of concept of the exploit came because a change in the dsimport tool for macOS Monterey broke the first vulnerability. This new exploit allows an attacker to use code injection to alter a binary called /usr/libexec/configd. This duo is responsible for making system-wide changes, including accessing the TCC database. This allowed Microsoft to silently change the home directory and perform the same type of attack as the first exploit.

Fortunately Microsoft notified Apple again of the vulnerability, and it was patched last month. Microsoft urges macOS users to make sure their version of macOS Monterey is updated with the latest patch. The company also took the time to promote its Defender for Endpoint enterprise security solution, which was able to prevent these vulnerabilities even before Apple patched them.
Related Articles
doolik website logo
Twitter has been down for some users following the death of Queen Elizabeth II on Thursday night, according to details released by the network shutdown monitoring service Netblocks and user reports of followers.
doolik website logo
New research by software engineer Felix Krause has revealed that TikTok has the ability to track every click on your screen while browsing in its iOS app, including links clicked and passwords typed.

doolik website logo
Apple has introduced updates to fill security holes discovered by the Indian "CERT-IN" team for rapid technical intervention in Apple Watch smart watches operating with outdated operating systems that facilitate hackers' penetration of the privacy of their owners.

Live Video Streaming
Live video streaming lets you engage with your audience in real time with a video feed. Broadcast your daily show to your audience with no limits, no buffering and high quality videos. Reach all devices anytime anywhere with different video qualities that suits any device and any connection.
$1,120/YE*
The website uses cookies to improve your experience. We’ll assume you’re ok with this, but you can opt-out if you wish.
ACCEPT