Cisco’s Talos Intelligence group has a very interesting blog post that any macOS user that runs Microsoft apps should read. First the bad news from said blog post:
Cisco Talos recently conducted an analysis of macOS applications and the exploitability of the platform’s permission-based security model, which centers on the Transparency, Consent, and Control (TCC) framework.
We identified eight vulnerabilities in various Microsoft applications for macOS, through which an attacker could bypass the operating system’s permission model by using existing app permissions without prompting the user for any additional verification. If successful, the adversary could gain any privileges already granted to the affected Microsoft applications. For example, the attacker could send emails from the user account without the user noticing, record audio clips, take pictures or record videos without any user interaction.
All of that is pretty bad. Now here’s what’s worse:
Microsoft considers these issues low risk, and some of their applications, they claim, need to allow loading of unsigned libraries to support plugins and have declined to fix the issues.
Lovely. I can say with confidence that someone will look at this and say “that’s a great way to get into a Mac and use it for my evil purposes.” Then this will become a major problem. And you have to wonder what Microsoft will do at that point. Though there’s always the possibility that Apple will force Microsoft to do something as it is their platform after all. I would love to be a fly on the wall when that conversation happens. In the meantime, there’s no mitigations for these vulnerabilities at present. So you’ll just have do your best to be careful out there.
Unit 42 Research Unveils Biggest Attack Surface Risks
Posted in Commentary with tags Palo Alto Networks on August 20, 2024 by itnerdRecently, Palo Alto Networks released the 2024 Unit 42 Attack Surface Threat Report unveiling the biggest risks facing the growing attack surface and key recommendations for organizations to strengthen their security postures.
Key points from the report:
You can read the report here.
Leave a comment »