{"id":136092,"date":"2024-10-17T09:00:00","date_gmt":"2024-10-17T16:00:00","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?p=136092"},"modified":"2024-10-17T09:05:14","modified_gmt":"2024-10-17T16:05:14","slug":"new-macos-vulnerability-hm-surf-could-lead-to-unauthorized-data-access","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/10\/17\/new-macos-vulnerability-hm-surf-could-lead-to-unauthorized-data-access\/","title":{"rendered":"New macOS vulnerability, \u201cHM Surf\u201d, could lead to unauthorized data access"},"content":{"rendered":"\n
Microsoft Threat Intelligence uncovered a macOS vulnerability that could potentially allow an attacker to bypass the operating system\u2019s Transparency, Consent, and Control (TCC) technology and gain unauthorized access to a user\u2019s protected data. The vulnerability, which we refer to as “HM Surf”, involves removing the TCC protection for the Safari browser directory and modifying a configuration file in the said directory to gain access to the user’s data, including browsed pages, the device\u2019s camera, microphone, and location, without the user\u2019s consent. <\/p>\n\n\n\n
After discovering the bypass technique, we shared our findings with Apple through Coordinated Vulnerability Disclosure (CVD)<\/a> via Microsoft Security Vulnerability Research (MSVR)<\/a>. Apple released a fix for this vulnerability, now identified as CVE-2024-44133, as part of security updates for macOS Sequoia<\/a>, released on September 16, 2024. At present, only Safari uses the new protections afforded by TCC. Microsoft is currently collaborating with other major browser vendors to investigate the benefits of hardening local configuration files.<\/p>\n\n\n\n We encourage macOS users to apply these security updates as soon as possible. Behavior monitoring protections in Microsoft Defender for Endpoint has detected activity associated with Adload, a prevalent macOS threat family, potentially exploiting this vulnerability. Microsoft Defender for Endpoint detects and blocks CVE-2024-44133 exploitation, including anomalous modification of the Preferences file through HM Surf or other methods.<\/p>\n\n\n\n We initially described TCC technology and how we were able to bypass it in our powerdir<\/a> vulnerability discovery. As a reminder, TCC is a technology that prevents apps from accessing users\u2019 personal information, including services such as location services, camera, microphone, downloads directory, and others, without their prior consent and knowledge. Formally, the only legitimate way for an app to gain access to those services is by approving a popup through the user interface, or by approving per-app access in the operating system\u2019s settings. In this blog post, we share details on how HM Surf can enable attackers to bypass TCC and access the said services without user consent. We also provide guidance for organizations to protect devices from successful exploitation.<\/p>\n\n\n\n Entitlements, as we shared in a past blog post<\/a>, are privileges that macOS apps might have, and are digitally signed by Apple. Apple reserves some entitlements to their own applications, which are known as private entitlements. Such entitlements commonly start with the com.apple.private<\/em> prefix.<\/p>\n\n\n\n When it comes to TCC, the com.apple.private.tcc.allow<\/em> entitlement allows the entitled app to completely bypass TCC checks for services that are mentioned under the entitlement. Safari, the default browser in macOS, has very powerful TCC entitlements, including com.apple.private.tcc.allow<\/em>:<\/p>\n\n\n There are two important aspects here:<\/p>\n\n\n\n By default, when one browses a website that requires access to the camera or the microphone, a TCC-like popup still appears, which means Safari maintains its own TCC policy. That makes sense, since Safari must maintain access records on a per-origin (website) basis:<\/p>\n\n\n We discovered that Safari maintains its configuration in various files under ~\/Library\/Safari<\/em> (the user\u2019s home directory). That said directory contains several files of interest, including the following:<\/p>\n\n\n\nSafari entitlements and TCC<\/h2>\n\n\n\n
\n