// Hacking NEWS // A Zero-Day Flaw Allows to Generate False Malicious Clicks

in #news5 years ago

A security researcher has shown that it is possible to bypass any access control alert on macOS Mojave and thus obtain the highest privileges on the machine. No patch is available to date.

mouse-click.png
Source

On Monday, Apple announced a new version of macOS, called Catalina. However, the firm did not comment on a new zero-day flaw in its macOS Mojave operating system, which security researcher Patrick Wardle revealed the day before at a conference.

This vulnerability allows malware to generate false clicks and, therefore, to validate certain security alerts, such as camera or microphone access, or the installation of a kernel extension.

For an attacker who has already successfully installed his code on a machine, this is a good way to raise his privileges to the highest level.

Capture d’écran (56).png
Source

An useful function, but easy to divert

The exploitation of this flaw is based on a macOS functionality that allows to generate virtual clicks. This is used by some applications for accessibility or automation purposes. The applications authorized to make these virtual clicks are registered in a white list.

Unfortunately, the underlying verification procedure is flawed. According to Patrick Wardle, all you have to do is take one of the applications on this list, for example VLC, and insert malicious code.

The macOS system sees nothing and allows the fake VLC application to use the virtual click feature to bypass security alerts.

"It's like booking a flight and, when security passes, I only give a piece of paper with my name written on it to identify myself," explains the researcher at the Decipher information site.

No patch is available to date for this flaw.
Capture d’écran (53).png
Capture d’écran (54).png
Capture d’écran (55).png

This is not the first time Patrick Wardle has undermined the protection that security alerts are supposed to provide. Apple introduced this type of access control in macOS exactly one year ago, in June 2018.

Since then, the researcher had already found two ways to bypass them. These flaws have been fixed, but obviously the procedure has not been audited from top to bottom. Too bad.

Source: The Hacker News

Stay Informed, Stay Safe

DQmdpsoEfLe5nRg4Q1oKWHNjLdMnAucCYfRou1yF5Yiwrzs.png

DQmNuF3L71zzxAyJB7Lk37yBqjBRo2uafTAudFDLzsoRV5L.gif

Coin Marketplace

STEEM 0.17
TRX 0.15
JST 0.028
BTC 60453.64
ETH 2425.08
USDT 1.00
SBD 2.48