<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>MacOS Catalina 10.15 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/macos-catalina-10.15/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/macos-catalina-10.15/feed.xml" rel="self" type="application/rss+xml"/><item><title>Microsoft Excel XLM Macro Remote Code Execution on macOS</title><link>https://feed.craftedsignal.io/briefs/2024-01-excel-xlm-rce/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-excel-xlm-rce/</guid><description>A logic flaw in Microsoft Excel allows remote code execution on macOS via malicious XLM macros in SYLK files, bypassing the 'Disable all macros without notification' setting.</description><content:encoded><![CDATA[<p>A zero-day vulnerability in Microsoft Excel for macOS allows for remote code execution through the exploitation of XLM macros embedded within SYLK (.slk) files. This vulnerability, originally discovered by Pieter Ceelen of Outflank, bypasses the security setting &ldquo;Disable all macros without notification,&rdquo; which is intended to prevent automatic macro execution. When this setting is enabled, Excel fails to properly disable XLM macros, leading to their silent execution upon opening a malicious .slk file. While modern macOS features like application sandboxing, file quarantine, and code notarization provide some mitigation, the vulnerability enables an attacker to execute arbitrary code within the context of the Excel process. The exploit has been confirmed on fully patched versions of Microsoft Excel 2016 and 2019 running on macOS Catalina 10.15, posing a significant risk to users who rely on the &ldquo;Disable all macros without notification&rdquo; setting for security.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious SYLK (.slk) file containing embedded XLM macros.</li>
<li>The victim receives the malicious .slk file, often delivered via download.</li>
<li>The victim opens the .slk file with Microsoft Excel on macOS.</li>
<li>Excel, despite the &ldquo;Disable all macros without notification&rdquo; setting, automatically executes the embedded XLM macros without prompting the user.</li>
<li>The XLM macro invokes the <code>CALL</code> function to execute arbitrary code. For example, <code>CALL(&quot;libc.dylib&quot;,&quot;system&quot;,&quot;JC&quot;,&quot;open -a Calculator&quot;)</code> to launch Calculator.app.</li>
<li>The executed code operates within the sandbox of the Microsoft Excel application.</li>
<li>Although sandboxed, attacker could attempt to exploit further vulnerabilities to escape the sandbox.</li>
<li>The attacker achieves code execution on the target system, potentially leading to further compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to execute arbitrary code on a macOS system without user interaction. While macOS sandboxing, file quarantine, and code notarization mechanisms can limit the impact, a successful exploit could lead to sensitive data compromise, arbitrary code execution, and further system compromise if the attacker can bypass these protections. The impact is somewhat mitigated by macOS security features, but it still presents a viable attack vector.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable the &ldquo;Disable all macros with notification&rdquo; setting in Microsoft Excel to ensure users are prompted before macro execution, as mentioned in the overview.</li>
<li>Monitor for the execution of unusual processes spawned by Microsoft Excel, using the Sigma rule <code>Detect Suspicious Process Spawned by Excel</code>.</li>
<li>Consider blocking SYLK (.slk) files at the email gateway and web proxy, as recommended by CERT.</li>
<li>Implement network monitoring to detect and block connections to known malicious command-and-control servers, to mitigate potential post-exploitation activity.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>excel</category><category>xlm</category><category>rce</category><category>macro</category><category>macos</category><category>sylk</category></item></channel></rss>