Security

Research

Multiple flaws in Microsoft macOS apps unpatched despite potential risks

Windows giant tells Cisco Talos it isn't fixing them


Cisco Talos says eight vulnerabilities in Microsoft's macOS apps could be abused by nefarious types to record video and sound from a user's device, access sensitive data, log user input, and escalate privileges.

The vulnerabilities exist across Excel, OneNote, Outlook, PowerPoint, Teams, and Word, but Microsoft told Talos it won't be fixing them. All eight can be seen below:

"Microsoft considers these issues low risk, and some of their applications, they claim, need to allow loading of unsigned libraries to support plugins and have declined to fix the issues," said Francesco Benvenuto, senior security research engineer at Talos.

Apple's security model is permission-based and relies on the transparency, consent, and control (TCC) framework. For users familiar with macOS, it's what's responsible for requesting your permission to run new apps, and displays prompts when those apps want to access sensitive stores such as contacts, photos, webcams, etc.

TCC works with what Apple calls entitlements, of which only a few are available to software makers, and developers choose what entitlements they need to have enabled.

So, if they know their app has a feature that requires the device's microphone, they enable that entitlement. Once it's enabled, macOS notices it needs to ask the user if that's OK, and delivers a prompt to get their explicit consent.

The whole idea behind Talos's work here is that once these entitlements, permissions – whatever you want to call them – are set by the user, they stay set unless manually changed in macOS's system settings.

If an attacker can take advantage of the apps that have already been granted permission to do the things they want to, they no longer have to trick a target into running a shady program; they can just exploit Word instead, for example, and inject some code into Word's processes so they can access protected resources.

Apple counters this with a few methods. Sandboxed apps is one. Every macOS app downloaded from the App Store is sandboxed and these can only access the resources the devs specified through entitlements.

Hardened runtime is another protection that works alongside sandboxed apps. It's responsible for stopping malicious libraries from being run, other than those specified by the devs or Apple itself, and attackers from executing code via trusted apps.

Benvenuto said that some of Microsoft's most popular apps have entitlements enabled that allow them to disable security features introduced by Apple's hardened runtime, such as library validation.

"Even though hardened runtime guards against library injection attacks and the sandbox secures user data and system resources, malware might still find ways to exploit certain applications under specific conditions," the researcher said

"If successful, this would allow the attacker to assume the application's entitlements and permissions. It's important to note that not all sandboxed applications are equally susceptible. Typically, a combination of specific entitlements or vulnerabilities is required for an app to become a viable attack vector.

"The vulnerabilities we're addressing are relevant when an application loads libraries from locations an attacker could potentially manipulate. If the application has the com.apple.security.cs.disable-library-validation entitlement, it allows an attacker to inject any library and run arbitrary code within the compromised application. As a result, the attacker could exploit the application's full set of permissions and entitlements."

All the Microsoft apps in question are protected by hardened runtime and also disable library validation through entitlements, effectively disabling protection against malicious library injection, Benvenuto argued.

He also highlighted that the only plugins available to Microsoft's macOS apps are Office add-ins, meaning there is no apparent reason to open their apps to running plugins from third parties, as they did through the entitlements.

The researcher didn't go as far as to provide a working exploit of how the issue could be abused in real-world attacks. The investigation instead served more as reminder of the ways in which software vendors ship apps to macOS that might not be as secure as the user would believe. We asked Talos for a bit more on this and will update if they offer more information.

Despite designating these vulnerabilities low-risk status and refusing to patch them, Microsoft has since updated its Teams apps, and OneNote, removing the entitlement that allowed library injection, essentially mitigating the bugs.

The Office apps were left untouched, though, and to Benvenuto remain unnecessarily vulnerable.

El Reg approached Microsoft for a response, but there was no immediate reply. ®

Send us news
21 Comments

Microsoft investigating 365 Office activation gremlin

Says it's not sure what the issue is but points at admins tweaking licensing options

Windows 11 24H2 strikes again – Outlook might not start with Google Workspace Sync running

Meanwhile, 365 Enterprise users have a date for new Outlook rollout

UK ICO not happy with Google's plans to allow device fingerprinting

Also, Ascension notifies 5.6M victims, Krispy Kreme bandits come forward, LockBit 4.0 released, and more

Apache issues patches for critical Struts 2 RCE bug

More details released after devs allowed weeks to apply fixes

Microsoft won't let customers opt out of passkey push

Enrollment invitations will continue until security improves

Microsoft Edge takes a victory lap with some high-looking usage stats for 2024

Lots of big numbers, but market share wasn't one of them

Microsoft coughs up yet more Windows 11 24H2 headaches

Users report the sound of silence from operating system update

Three more vulns spotted in Ivanti CSA, all critical, one 10/10

Patch up, everyone – that admin portal is mighty attractive to your friendly cyberattacker

AI's rising tide lifts all chips as AMD Instinct, cloudy silicon vie for a slice of Nvidia's pie

Analyst estimates show growing apetite for alternative infrastructure

When old Microsoft codenames crop up in curious places

Chicago is my kind of driver model

Suggested Actions fails to suggest its own survival as Windows 11 feature killed

Final curtain call for weird wingman

Fully patched Cleo products under renewed 'zero-day-ish' mass attack

Thousands of servers targeted while customers wait for patches