Discovered a new zero-day vulnerability on macOS that allows attackers to run commands remotely
This is essentially a high-severity zero-day vulnerability that could allow an attacker to execute arbitrary commands on a target Mac, regardless of the version of macOS in use.
This vulnerability was first found by a team of independent security researchers led by cybersecurity expert Park Minchan. The problem stems from the way macOS handles inetloc files, which inadvertently causes the system to automatically run any commands embedded inside by the attacker without being able to issue any warnings or prompts. for users.
On macOS, Internet location files with the .inetloc extension are system-wide storage of bookmark data, and can be used to open online resources (news://, ftp://) , afp://) or local files (file://).
"A vulnerability in macOS Finder allows files with the inetloc extension to execute arbitrary commands. These files could be embedded inside malicious email messages that, if clicked by the user, would immediately execute the commands specified. embedded inside without giving any prompts or warnings to the user'.
For its part, Apple seems to be aware of the problem and is quietly fixing it without specifying a CVE identifier. The Park Minchan team and colleagues also discovered that Apple's patch only partially addresses the vulnerability, as it can still be exploited by changing the protocol used to execute embed commands from the file. :// to File://.
"We have informed Apple that FiLe:// (value change only) does not appear to be blocked, but have not received any response from them so far. As far as we know, currently Currently, this vulnerability has not really been patched."
The team has not provided any specific information on how attackers can abuse this vulnerability. However, in theory, it is entirely possible to be used by threat actors to create malicious email attachments that can launch an accompanying or remote payload when accessed by the victim.
Initial field tests have confirmed that this vulnerability can be used to run arbitrary commands on macOS Big Sur, using specially crafted files downloaded from the Internet without any any prompts or warnings.
A .inetloc file with PoC code also went undetected by any anti-malware engine on VirusTotal. That means macOS users targeted by threat actors using this attack method will not be protected by security software.
Hopefully Apple will soon implement more thorough measures to fix the problem in the near future
You should read it
- Microsoft fixes a serious vulnerability that has existed for 17 years in Windows Server
- VMware patches RCE Spring4Shell vulnerability on a wide range of products
- ProFTPD remote code execution vulnerability affects more than 1 million servers worldwide
- Log4Shell zero-day vulnerability discovered, the new nightmare of enterprises
- Update your Macbook now to avoid this major security bug
- Detects code execution vulnerabilities in WinRAR, noting more than 100 infringement cases
- Adobe Flash Player has a serious zero-day vulnerability
- Warning of dangerous Spring4Shell vulnerability, there are signs of scanning and exploiting
May be interested
- The vulnerability on macOS 10.13 allows access to the Mac with any passwordanyone can access the settings on the app store of the macos high sierra without the right password, and another serious vulnerability.
- Detect a critical flaw in VMware Cloud Director, which could pave the way for hackers to take control of enterprise serversthe newly discovered vulnerability in vmware's cloud director platform has the ability to allow attackers to access sensitive information and even control private clouds throughout the infrastructure.
- GitLab patches critical vulnerability that allows hackers to take control of accountsgitlab has just resolved a critical vulnerability that could allow hackers to take over users' accounts with hard-coded passwords. it is worth mentioning here that the hacker can perform the attack remotely.
- Detecting a serious security vulnerability on macOS, this 18-year-old youth refused to disclose it because Apple did not pay the bonuslinus henze, an 18-year-old german, recently claimed to have discovered a serious security flaw on macos that could expose the machine's storage passwords to malicious applications.
- Wi-Fi Vulnerability Leads to FragAttacks Attacksattackers have exploited the wifi vulnerability to perform data theft and spread malicious code that affects the device.
- Detected a serious zero-day vulnerability in Microsoft Office, click the document file and it will stickthe newly discovered vulnerability is called follina and currently there is no official patch from microsoft.
- Google announced a serious vulnerability in the macOS kernelthis vulnerability is located in macos xnu (kernel) kernel, if it successfully exploits it, malicious hackers or programs can manipulate the file system without informing the operating system.
- Google discovered two serious vulnerabilities on iOSgoogle 's project zero security team discovered two new security vulnerabilities of the zero-day vulnerability called cve-2019-7286 and cve-2019-7287 on ios that allow hackers to exploit to take advantage of it. user.
- Vulnerability on macOS helps hackers easily overcome security barriersthe interface of macos allows converting key presses into mouse operations. even when a user performs a double-click operation, macos will recognize that as the command to click the ok button.
- Log4Shell zero-day vulnerability discovered, the new nightmare of enterpriseshow to exploit a critical zero-day vulnerability in the java-based apache log4j logging library has just been posted on the internet. this leaves users and businesses as well as organizations vulnerable to remote code execution attacks.