Microsoft discovers bug in macOS that allows malware to circumvent Apple’s security

Share post:

After Jonathan Bar Or, a Microsoft security researcher, discovered the Achilles CVE-2022-42821 macOS flaw, which allowed hackers to deploy malware to vulnerable macOS devices via untrusted apps and circumvent application execution restrictions imposed by Apple’s Gatekeeper security mechanism. Apple fixed the bug in macOS 13 (Ventura), macOS 12.6.2 (Monterey), and macOS 1.7.2 (Big Sur).

The Gatekeeper mechanism is intended to ensure that only trusted apps are allowed to run on Mac devices. However, a vulnerability known as Achilles by Microsoft enabled cybercriminals to circumvent this security measure.

Microsoft discovered the Achilles vulnerability, which uses a permission model known as Access Control Lists (ACLs) to add extremely restrictive permissions to a downloaded file (i.e., “everyone deny write,writeattr,writeextattr,writesecurity,chown”), preventing Safari from setting the quarantine extended attribute.

On Apple macOS, the Gatekeeper security mechanism is intended to identify trusted apps. An extended attribute called “com.apple.quarantine” enforces this. It is assigned to internet-downloaded files.

According to Microsoft, the Achilles vulnerability takes advantage of a permission model known as Access Control Lists (ACLs) to grant extremely limited permissions to a downloaded file (i.e., “everyone deny write,writeattr,writeextattr,writesecurity,chown”). It prevents Safari from configuring the quarantine extended attribute.

The sources for this piece include an article in BleepingComputer.

SUBSCRIBE NOW

Related articles

Cyber Security Today, May 3, 2024 – North Korea exploits weak email DMARC settings, and the latest Verizon analysis of thousands of data breaches

This episode reports on warnings about threats from China, Russia and North Korea, the hack of Dropbox Sign's infrastructure

Hashtag Trending for World Password Day, Thursday, May 2nd, 2024

Security firm Okta warns of an unprecendented password stuffing attack that is piggybacking on regular user’s mobile and...

Google Chrome’s new post-quantum cryptography causes connection issues

The latest update to Google Chrome, version 124, which integrates a new quantum-resistant encryption mechanism, has led to...

UK legislation bans weak passwords

Starting Monday, the UK will enforce new laws banning the sale of devices with weak default passwords such...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways