Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025

Discover the areas hiding in trusted instruments – find out how in this free expert session

June 19, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Microsoft Discovers macOS Vulnerability CVE-2024-44243 That Allows Installation of Rootkits
Global Security

Microsoft Discovers macOS Vulnerability CVE-2024-44243 That Allows Installation of Rootkits

AdminBy AdminJanuary 14, 2025No Comments3 Mins Read
macOS SIP Vulnerability
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


January 14, 2025Ravi LakshmananEndpoint Security / Vulnerability

macOS SIP Vulnerability

Microsoft has shed light on a patched security flaw in Apple’s macOS that, if successfully exploited, could allow an attacker running as root to bypass the operating system’s system integrity protections (SYPT) and install malicious kernel drivers by downloading third-party kernel extensions.

The vulnerability in question CVE-2024-44243 (CVSS Score: 5.5), a moderate bug that was fixed by Apple in the framework macOS Sequoia 15.2 released last month. The iPhone maker described it as a “configuration issue” that could allow a malicious app to modify protected parts of the file system.

“Bypassing SIP can have serious consequences, such as increasing the potential for attackers and malware authors to successfully install rootkits, create persistent malware, bypass Transparency, Consent and Control (TCC), and expand the attack surface for additional techniques and exploits,” Jonathan Barr Orr of the Microsoft Threat Intelligence team said.

Cyber ​​security

SIP, also called rootless, is a security framework which aims to prevent malware installed on a Mac from interfering with protected parts of the operating system, including /System, /usr, /bin, /sbin, /var, and applications that come preinstalled on the device.

It works by providing various protections against the root user account, allowing only Apple-signed processes that have special write rights to system files, such as Apple software updates and Apple installers, to modify these protected parts.

Two rights specific to SIP are given below –

  • com.apple.rootless.install, which removes SIP file system restrictions for a process with this privilege
  • com.apple.rootless.install.heritable, which removes SIP file system restrictions for the process and all its child processes by inheriting com.apple.rootless.install

CVE-2024-44243, the latest SIP bypass discovered by Microsoft in macOS after CVE-2021-30892 (Rootless) and CVE-2023-32369 (Migraine), uses the Storage Kit daemon (storagekitd) privilege “com.apple.rootless.install.heritable” to bypass SIP protection.

Specifically, this is achieved by taking advantage of “StorageKitd’s ability to invoke arbitrary processes without proper validation or privilege stripping” to deliver a new filesystem package to /Library/Filesystems – a StorageKitd child process – and redefine the binaries associated with Drive. A utility that can then be run during certain operations, such as disk repair.

Cyber ​​security

“Because an attacker who can run as root can dump a new filesystem in /Library/Filesystems, he can later run storagekitd to create custom binaries, thus bypassing SIP,” Barr Orr said. “Running an erase operation on a newly created file system can also bypass SIP protection.”

The disclosure comes nearly three months after Microsoft also detailed another security flaw in Apple’s Transparency, Consent and Control (TCC) system in macOS (CVE-2024-44133CVSS score: 5.5) – aka HM Surf – which can be used to access sensitive data.

“Prohibiting third-party code from running in the kernel can improve the reliability of macOS, but the trade-off is that it reduces the monitoring capabilities of security solutions,” Bar Orr said.

“When SIP is bypassed, the entire operating system can no longer be considered trustworthy, and with reduced monitoring visibility, threat actors can tamper with any security solutions on the device to avoid detection.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025

Discover the areas hiding in trusted instruments – find out how in this free expert session

June 19, 2025

Russian APT29 operates Gmail app passwords to get around 2FA in the target phishing campaign

June 19, 2025

Meta adds support to logy for Android and iOS users

June 19, 2025

Linux’s new drawbacks provide complete root access via PAM and Udisks in major distributions

June 19, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025

Discover the areas hiding in trusted instruments – find out how in this free expert session

June 19, 2025

Russian APT29 operates Gmail app passwords to get around 2FA in the target phishing campaign

June 19, 2025

Meta adds support to logy for Android and iOS users

June 19, 2025

Linux’s new drawbacks provide complete root access via PAM and Udisks in major distributions

June 19, 2025

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025

Discover the areas hiding in trusted instruments – find out how in this free expert session

June 19, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.