Cisco Talos researchers discovered eight vulnerabilities in Microsoft apps on the macOS operating system. These vulnerabilities allow malicious attackers to bypass the operating system's permission model through existing permissions without requiring additional validation from the user. A successful attack allows malicious attackers to obtain all permissions already obtained in the target application, such as sending email, recording video and audio, and capturing photos. According to the investigation, Microsoft considers these vulnerabilities to be low risk and has refused to fix the issues.
“Security teams should remain vigilant as Microsoft's macOS apps contain vulnerabilities that could lead to potential breaches,” said Eric Schwake, director of cybersecurity strategy at Salt Security. “These vulnerabilities could allow for the injection of malicious code that could allow attackers to hijack permissions granted to the user and access sensitive resources like the camera, microphone, and screen recording without the user's consent. While Microsoft has downplayed the risks, the potential for unauthorized surveillance and data exfiltration is significant. Immediate action is critical, so security teams should prioritize updating vulnerable apps and consider additional security measures such as implementing strict access controls and limiting app permissions to mitigate these risks.”
Jason Soroko, Sectigo's senior vice president of product, commented: “This is not something that should become a trend. Beating Apple's security undermines why people buy into its ecosystem. This situation demonstrates the need for security teams to critically evaluate the permissions and permissions granted to applications, even if users themselves don't evaluate them. Immediate actions to be taken include reviewing and strengthening app permissions, implementing monitoring for anomalous activity, and encouraging users to update their software as soon as patches are released. Additionally, it is essential that software vendors and Apple work together to ensure security features are implemented appropriately without compromising functionality.”