Microsoft on Wednesday shed light on a now patched security vulnerability affecting Appleโs operating systems that, if successfully exploited, could allow attackers to escalate device privileges and deploy malware.
โAn attacker could take advantage of this sandbox escape vulnerability to gain elevated privileges on the affected device or execute malicious commands like installing additional payloads,โ Jonathan Bar Or of the Microsoft 365 Defender Research Team said in a write-up.
Tracked as CVE-2022-26706 (CVSS score: 5.5), the security vulnerability impacts iOS, iPadOS, macOS, tvOS, and watchOS and was fixed by Apple in May 2022.
Calling it an access issue affecting the LaunchServices (launchd) component, the iPhone maker noted that โA sandboxed process may be able to circumvent sandbox restrictions,โ adding it mitigated the issue with additional restrictions.
While Appleโs App Sandbox is designed to tightly regulate a third-party appโs access to system resources and user data, the vulnerability makes it possible to bypass these restrictions and compromise the machine.
โThe sandboxโs primary function is to contain damage to the system and the userโs data if the user executes a compromised app,โ Apple explains in its documentation.
โWhile the sandbox doesnโt prevent attacks against your app, it does reduce the harm a successful attack can cause by restricting your app to the minimum set of privileges it requires to function properly.โ
Microsoft said it discovered the flaw during its attempts to figure out a way to escape the sandbox and execute arbitrary commands on macOS by concealing the malicious code in a specially crafted Microsoft Office macro.
Specifically, the tweet-sized proof-of-concept (PoC) devised by the tech giant leverages Launch Services as a means to run an open command โ a utility used to open files and launch apps โ on a Python payload containing rogue instructions.
But itโs worth noting that any file dropped by a sandboxed app is automatically tagged with the โcom.apple.quarantineโ extended attribute so as to trigger a prompt requiring explicit userโs consent prior to execution.
This constraint, however, can be eliminated by utilizing the -stdin option for the open command associated with the Python exploit file.
โโstdin bypassed the โcom.apple.quarantineโ extended attribute restriction, as there was no way for Python to know that the contents from its standard input originated from a quarantined file,โ Bar Or said.
Found this article interesting? Follow THN on Facebook, Twitter ๏ and LinkedIn to read more exclusive content we post.