Zero-Day in macOS Allows Root Access

NJCCIC Alert

Original Release Date: 2018-01-04

A security researcher discovered a local privilege escalation (LPE) vulnerability that exists in macOS versions dating back to at least 2002. The vulnerability impacts the IOHIDFamily macOS kernel driver and can be leveraged by threat actors through logout operations such as manual shutdown or reboot. If successfully exploited, an unauthorized user could install a malicious application and gain complete control over a system by escalating account privileges to root level. The flaw also disables security features including the System Integrity Protection (SIP) and Apple Mobile File Integrity (AMFI). An attacker must have physical access to a machine or have previously established access to the device in order for the vulnerability to be exploited. Apple plans to release a patch for the exploit later this month. A detailed report of the vulnerability is available on GitHub

The NJCCIC recommends users and administrators of affected macOS systems apply Apple software updates as soon as they are released and only download applications from the official Mac App Store.

New Jersey Cybersecurity & Communications Integration Cell

2 Schwarzkopf Dr, Ewing Township, NJ 08628

njccic@cyber.nj.gov

OUR COMMITMENT

The NJCCIC is a component organization within the New Jersey Office of Homeland Security and Preparedness. We are the State's one-stop-shop for cyber threat analysis, incident reporting, and information sharing and are committed to making New Jersey more resilient to cyber threats by spreading awareness and promoting the adoption of best practices.

Agency Seals of State of NJ, NJOHSP and NJCCIC

STAY CONNECTED:

View our Privacy Policy here.

View our Site Index here.