Zoom macOS Client Privilege Escalation Vulnerability
Zoom's macOS client contains a local privilege escalation vulnerability that allows an unprivileged attacker to gain root privileges by subverting the runwithroot script, due to the insecure use of the deprecated AuthorizationExecuteWithPrivileges API.
The Zoom macOS client, specifically version 4.6.8 (19178.0323) and earlier, contains a local privilege escalation vulnerability. This vulnerability stems from the insecure use of the deprecated AuthorizationExecuteWithPrivileges API. The Zoom installer copies a bash script named runwithroot to a user-writable temporary directory. A local, unprivileged attacker can subvert this script before it is executed as root, thereby escalating their privileges. The vulnerability requires a local foothold on the macOS system and relies on the installer or updater being executed. While Zoom has faced other security and privacy concerns, this particular flaw allows for a complete takeover of the system by a local attacker. This privilege escalation vulnerability poses a significant risk, particularly in environments where multiple users share a single macOS system or where malware may already have a limited foothold. Zoom patched this in version 4.6.9 (19273.0402).
Attack Chain
- Attacker gains initial access to the macOS system via malware or other means.
- The Zoom installer package (Zoom.pkg) is executed, either by the user or automatically through an update.
- The macOS Installer copies the
runwithrootscript to a user-writable temporary directory, such as/private/var/folders/v5/s530008n11dbm2n2pgzxkk700000gp/T/com.apple.install.v43Mcm4r/. - The attacker identifies the temporary directory and modifies the
runwithrootscript with malicious commands. - The installer invokes the AuthorizationExecuteWithPrivileges API, prompting the user for administrator credentials if they are not already an administrator.
- The system executes
/usr/libexec/security_authtrampolinewith therunwithrootscript as an argument. - The
runwithrootscript, now containing malicious commands, executes with root privileges. - The attacker achieves root-level access on the system, allowing them to perform any action they desire, such as installing malware, stealing data, or compromising other users.
Impact
Successful exploitation of this vulnerability allows a local attacker to gain complete control over the affected macOS system. The attacker can install persistent backdoors, steal sensitive data, or compromise other user accounts on the system. While the report does not specify the number of victims, the widespread use of Zoom makes this a high-impact vulnerability. Sectors targeted could include any organization using Zoom on macOS, potentially leading to significant data breaches or system compromise.
Recommendation
- Upgrade Zoom to version 4.6.9 (19273.0402) or later to patch the privilege escalation vulnerability.
- Deploy the Sigma rule
Detect Modification of Zoom runwithroot Scriptto detect attempts to modify the vulnerable script. - Monitor for the execution of
security_authtrampolinewith arguments pointing to user-writable directories, as indicated in the analysis of the AuthorizationExecuteWithPrivileges API usage. - Enable process monitoring to detect the execution of scripts or binaries from temporary directories, which can indicate exploitation attempts.
- Consider disabling or restricting the use of the AuthorizationExecuteWithPrivileges API where possible, as recommended by Apple.
Detection coverage 2
Detect Modification of Zoom runwithroot Script
criticalDetects modification of the Zoom runwithroot script in temporary directories, indicating a potential privilege escalation attempt.
Detect Security Authtrampoline Executing Suspicious Scripts
highDetects execution of scripts from user-writable temporary directories via security_authtrampoline, which may indicate a privilege escalation attempt
Detection queries are available on the platform. Get full rules →