Critical vulnerability discovered in OS X
Built-in security measures no match for Zero Day flaw, claims security firm
Pedro Vilaa, a researcher from specialising in Mac OS X at SentinelOne, claims to have found a critical flaw in all versions of the desktop operating system that can bypass all Apple's built-in security measures, notably System Integrity Protection.
According to Vilaa, who will be presenting his findings today at SysCan360 2016 in Singapore, the flaw is a non-memory corruption bug that allows for local privilege escalation by executing arbitrary code on any binary.
"We informed Apple of the vulnerability and it has since been patched with El Capitan 10.11.4 and iOS 9.3. However, from Apple's Security Bulletin, it seems that other versions do not appear to have a patch for this specific bug, which could suggest that they are still left vulnerable to this specific bug," Vilaa told IT Pro. "The only real way to mitigate this threat is to upgrade to El Capitan 10.11.4. Anything else is left vulnerable to an attack."
IT Pro contacted Apple for further clarification but had not received a response at the time of publication.
According to SentinelOne, any exploitation of the flaw would require the attacker to compromise the system, which could be achieved via spearphishing or exploiting the user's browser. Once this first step had been carried out, the attack on the OS itself would be "virtually impossible" to detect.
"The nature of this particular exploit enables it to evade defenses by utilising very reliable and stable techniques that traditional detection mechanisms, looking for more obvious warning signs, would miss," the company said, adding it "could typically be used in highly targeted or state sponsored attacks".
A bad week for Apple
It has been a bad week for Apple when it comes to bugs in its operating systems. Just a few days ago, Johns Hopkins University discovered a serious flaw in Apple's iMessage platform that could give attackers access to visual media sent via the service.
It was also revealed midweek that the FBI may no longer need the help of Apple to break into an iPhone 5c belonging to one of the San Bernardino shooters after an "outside party", allegedly Israeli data forensics firm Cellebrite, came forward with a way to access the data held on the device.
The IT Pro guide to Windows 10 migration
Everything you need to know for a successful transitionDownload now
Managing security risk and compliance in a challenging landscape
How key technology partners grow with your organisationDownload now
Software-defined storage for dummies
Control storage costs, eliminate storage bottlenecks and solve storage management challengesDownload now
6 best practices for escaping ransomware
A complete guide to tackling ransomware attacksDownload now