Apple has fixed a security bug in its MacOS software after Microsoft researchers alerted the iPhone maker about the vulnerability that could be used by hackers.
Microsoft discovered the vulnerability in MacOS that could allow an attacker to bypass System Integrity Protection (SIP) in macOS and perform arbitrary operations on a device.
The bug allowed a potential attacker to install a hardware interface that allows them to “overwrite system files, or install persistent, undetectable malware”.
“We also found a similar technique that could allow an attacker to elevate their privileges to root an affected device. We shared these findings with Apple through Coordinated Vulnerability Disclosure (CVD) via Microsoft Security Vulnerability Research (MSVR),” Microsoft 365 Defender Research Team said in a statement.
Apple issued a fix for this vulnerability, now identified as CVE-2021-30892, in its latest security update.
SIP is a security technology in macOS that restricts a root user from performing operations that may compromise system integrity.
“We found that the vulnerability lies in how Apple-signed packages with post-install scripts are installed. A malicious actor could create a specially crafted file that would hijack the installation process,” the Microsoft researchers noted.
After bypassing SIP’s restrictions, the attacker could then install a malicious kernel driver (rootkit), overwrite system files, or install persistent, undetectable malware, among others.
As networks become increasingly heterogeneous, the number of threats that attempt to compromise non-Windows devices also increases.
Microsoft Defender for Endpoint on Mac enables organizations to gain visibility and detect threats on macOS devices, the company said.
“This research underscores the importance of collaboration among security researchers, software vendors, and the larger security community,” Microsoft added.