Article Details
Scrape Timestamp (UTC): 2025-01-13 18:27:36.847
Original Article Text
Click to Toggle View
Microsoft: macOS bug lets hackers install malicious kernel drivers. Apple recently addressed a macOS vulnerability that allows attackers to bypass System Integrity Protection (SIP) and install malicious kernel drivers by loading third-party kernel extensions. System Integrity Protection (SIP), or 'rootless,' is a macOS security feature that prevents malicious software from altering specific folders and files by limiting the root user account's powers in protected areas. SIP allows only Apple-signed processes or those with special entitlements, such as Apple software updates, to modify macOS-protected components. Disabling SIP normally requires a system restart and booting from macOS Recovery (the built-in recovery system), which requires physical access to a compromised machine device. The security flaw (tracked as CVE-2024-44243), which can only be exploited by local attackers with root privileges in low-complexity attacks requiring user interaction, was found in the Storage Kit daemon that handles disk state-keeping. Successful exploitation could allow attackers to bypass SIP root restrictions without physical access to install rootkits (kernel drivers), create persistent, "undeletable" malware, or circumvent Transparency, Consent, and Control (TCC) security checks to access victims' data. Apple has patched the vulnerability in security updates for macOS Sequoia 15.2, released one month ago, on December 11, 2024. "System Integrity Protection (SIP) serves as a critical safeguard against malware, attackers, and other cybersecurity threats, establishing a fundamental layer of protection for macOS systems," Microsoft said today in a report that provides more technical details on CVE-2024-44243. "Bypassing SIP impacts the entire operating system's security and could lead to severe consequences, emphasizing the necessity for comprehensive security solutions that can detect anomalous behavior from specially entitled processes." Microsoft security researchers have discovered multiple macOS vulnerabilities in recent years. A SIP bypass dubbed 'Shrootless' (CVE-2021-30892), reported in 2021, also allows attackers to perform arbitrary operations on compromised Macs and potentially install rootkits. More recently, they also found another SIP bypass dubbed 'Migraine' (CVE-2023-32369) and a security flaw known as Achilles (CVE-2022-42821), which can be exploited to deploy malware via untrusted apps capable of bypassing Gatekeeper execution restrictions. Microsoft principal security researcher Jonathan Bar Or also discovered 'powerdir' (CVE-2021-30970), another macOS vulnerability that lets attackers bypass Transparency, Consent, and Control (TCC) technology to access macOS users' protected data.
Daily Brief Summary
Apple fixed a macOS security flaw (CVE-2024-44243) that let hackers install kernel drivers by bypassing System Integrity Protection.
Attackers could exploit this vulnerability locally with root access, needing user interaction but not physical access.
The flaw resided in the Storage Kit daemon responsible for maintaining disk states.
System Integrity Protection (SIP) generally prevents alterations to critical system files and requires a system restart from macOS Recovery for deactivation.
The loophole could enable the installation of rootkits and persistent malware without physical device access.
Patch updates for macOS Sequoia 15.2 were released in December 2024 to address this vulnerability.
Microsoft has previously identified multiple SIP bypass vulnerabilities in macOS, indicating a pattern of similar security issues.