0Day: macOS privacy protections bypass

Last year, Apple expanded its security vulnerability to include macOS with the iPhone. However, according to at least one researcher, the company is not acting fast enough on some exploits.

Developer Jeff Johnson informed Apple about one which allows an attacker to steal private data with a malicious Safari clone six months ago.

If a user is tricked into downloading the malware , ο κλώνος του Safari παρέχει αδικαιολόγητη on macOS. Any restricted files that are available in Safari become immediately available to the attacker.

Johnson explains that the exploit works because the Transparency, Consent, and Control privacy feature Apple performs insufficient authentication of a file. This means that the modified version of Safari can run without the aforementioned protection enabled.

And yes, exploit also works in the current macOS 11 Big Sur beta.

Johnson says Apple told him they were still investigating the problem, after initially telling him it would be fixed in the spring of 2020. Of course, people are currently flooded with an ongoing pandemic and workers around the world are working online, something justifying delays.

Hopefully the bug will be fixed once Big Sur goes public. For more on how exploit works, see Johnson's post from here.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).