Critical vulnerability discovered in OS X

Built-in security measures no match for Zero Day flaw, claims security firm

Pedro Vilaa, a researcher from specialising in Mac OS X at SentinelOne, claims to have found a critical flaw in all versions of the desktop operating system that can bypass all Apple's built-in security measures, notably System Integrity Protection.

According to Vilaa, who will be presenting his findings today at SysCan360 2016 in Singapore, the flaw is a non-memory corruption bug that allows for local privilege escalation by executing arbitrary code on any binary.

Advertisement - Article continues below

"We informed Apple of the vulnerability and it has since been patched with El Capitan 10.11.4 and iOS 9.3. However, from Apple's Security Bulletin, it seems that other versions do not appear to have a patch for this specific bug, which could suggest that they are still left vulnerable to this specific bug," Vilaa told IT Pro. "The only real way to mitigate this threat is to upgrade to El Capitan 10.11.4. Anything else is left vulnerable to an attack."

IT Pro contacted Apple for further clarification but had not received a response at the time of publication.

According to SentinelOne, any exploitation of the flaw would require the attacker to compromise the system, which could be achieved via spearphishing or exploiting the user's browser. Once this first step had been carried out, the attack on the OS itself would be "virtually impossible" to detect.

Advertisement
Advertisement - Article continues below

"The nature of this particular exploit enables it to evade defenses by utilising very reliable and stable techniques that traditional detection mechanisms, looking for more obvious warning signs, would miss," the company said, adding it "could typically be used in highly targeted or state sponsored attacks".

Advertisement - Article continues below

A bad week for Apple

It has been a bad week for Apple when it comes to bugs in its operating systems. Just a few days ago, Johns Hopkins University discovered a serious flaw in Apple's iMessage platform that could give attackers access to visual media sent via the service.

It was also revealed midweek that the FBI may no longer need the help of Apple to break into an iPhone 5c belonging to one of the San Bernardino shooters after an "outside party", allegedly Israeli data forensics firm Cellebrite, came forward with a way to access the data held on the device.

Featured Resources

Staying ahead of the game in the world of data

Create successful marketing campaigns by understanding your customers better

Download now

Remote working 2020: Advantages and challenges

Discover how to overcome remote working challenges

Download now

Keep your data available with snapshot technology

Synology’s solution to your data protection problem

Download now

After the lockdown - reinventing the way your business works

Your guide to ensuring business continuity, no matter the crisis

Download now
Advertisement

Recommended

Apple hit with $1.4 billion Siri patent infringement lawsuit
Policy & legislation

Apple hit with $1.4 billion Siri patent infringement lawsuit

3 Aug 2020
Apple acquires startup to turn iPhones into payment terminals
Technology

Apple acquires startup to turn iPhones into payment terminals

3 Aug 2020
Big tech CEOs grilled by House Judiciary Committee’s antitrust panel
Policy & legislation

Big tech CEOs grilled by House Judiciary Committee’s antitrust panel

30 Jul 2020
Apple is under investigation for alleged deceptive practices
Policy & legislation

Apple is under investigation for alleged deceptive practices

24 Jul 2020

Most Popular

How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

3 Aug 2020
How to use Chromecast without Wi-Fi
Mobile

How to use Chromecast without Wi-Fi

4 Aug 2020
How do I fix the Windows 10 Start Menu if it's frozen?
operating systems

How do I fix the Windows 10 Start Menu if it's frozen?

3 Aug 2020