<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>MacOS Malware Removal Tool — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/macos-malware-removal-tool/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 14:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/macos-malware-removal-tool/feed.xml" rel="self" type="application/rss+xml"/><item><title>Zoom macOS Client Privilege Escalation Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-zoom-macos-privesc/</link><pubDate>Wed, 03 Jan 2024 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-zoom-macos-privesc/</guid><description>Zoom's macOS client contains a local privilege escalation vulnerability that allows an unprivileged attacker to gain root privileges by subverting the runwithroot script, due to the insecure use of the deprecated AuthorizationExecuteWithPrivileges API.</description><content:encoded><![CDATA[<p>The Zoom macOS client, specifically version 4.6.8 (19178.0323) and earlier, contains a local privilege escalation vulnerability. This vulnerability stems from the insecure use of the deprecated AuthorizationExecuteWithPrivileges API. The Zoom installer copies a bash script named <code>runwithroot</code> to a user-writable temporary directory. A local, unprivileged attacker can subvert this script before it is executed as root, thereby escalating their privileges. The vulnerability requires a local foothold on the macOS system and relies on the installer or updater being executed. While Zoom has faced other security and privacy concerns, this particular flaw allows for a complete takeover of the system by a local attacker. This privilege escalation vulnerability poses a significant risk, particularly in environments where multiple users share a single macOS system or where malware may already have a limited foothold. Zoom patched this in version 4.6.9 (19273.0402).</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to the macOS system via malware or other means.</li>
<li>The Zoom installer package (Zoom.pkg) is executed, either by the user or automatically through an update.</li>
<li>The macOS Installer copies the <code>runwithroot</code> script to a user-writable temporary directory, such as <code>/private/var/folders/v5/s530008n11dbm2n2pgzxkk700000gp/T/com.apple.install.v43Mcm4r/</code>.</li>
<li>The attacker identifies the temporary directory and modifies the <code>runwithroot</code> script with malicious commands.</li>
<li>The installer invokes the AuthorizationExecuteWithPrivileges API, prompting the user for administrator credentials if they are not already an administrator.</li>
<li>The system executes <code>/usr/libexec/security_authtrampoline</code> with the <code>runwithroot</code> script as an argument.</li>
<li>The <code>runwithroot</code> script, now containing malicious commands, executes with root privileges.</li>
<li>The attacker achieves root-level access on the system, allowing them to perform any action they desire, such as installing malware, stealing data, or compromising other users.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a local attacker to gain complete control over the affected macOS system. The attacker can install persistent backdoors, steal sensitive data, or compromise other user accounts on the system. While the report does not specify the number of victims, the widespread use of Zoom makes this a high-impact vulnerability. Sectors targeted could include any organization using Zoom on macOS, potentially leading to significant data breaches or system compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Zoom to version 4.6.9 (19273.0402) or later to patch the privilege escalation vulnerability.</li>
<li>Deploy the Sigma rule <code>Detect Modification of Zoom runwithroot Script</code> to detect attempts to modify the vulnerable script.</li>
<li>Monitor for the execution of <code>security_authtrampoline</code> with arguments pointing to user-writable directories, as indicated in the analysis of the AuthorizationExecuteWithPrivileges API usage.</li>
<li>Enable process monitoring to detect the execution of scripts or binaries from temporary directories, which can indicate exploitation attempts.</li>
<li>Consider disabling or restricting the use of the AuthorizationExecuteWithPrivileges API where possible, as recommended by Apple.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>privilege-escalation</category><category>macos</category><category>zoom</category></item></channel></rss>