Duncan Riley
2025-01-14 18:59:00
siliconangle.com
Microsoft Threat Intelligence has revealed details of a now patched but previously unknown macOS vulnerability that could have allowed attackers to bypass Apple Inc.’s System Integrity Protection in macOS by loading third-party kernel extensions.
System Integrity Protection is a macOS security feature that is designed to prevent unauthorized modifications to system files and processes, even by users with root access. SIP helps maintain the integrity and reliability of the operating system by restricting access to critical system components and, in doing so, reduces the risk of malware and other exploits.
The vulnerability in this case, CVE-2024-44243, was introduced to macOS in a Dec. 11 update and involved exploiting the storagekitd daemon, a privileged process used for disk management. Attackers with root access could exploit the process’s special entitlements to load unauthorized kernel extensions, bypassing SIP protections and making it possible to install persistent malware or rootkits that evade detection by traditional security tools.
Microsoft’s research found that storagekitd’s ability to invoke child processes without proper validation was a critical vulnerability. By leveraging third-party file system implementations, attackers could bypass kernel extension restrictions to trigger vulnerabilities through seemingly legitimate operations, expanding the attack surface significantly.
Uncovering the vulnerability also had its own challenges due to macOS’s limited kernel visibility for security solutions. Microsoft overcame the challenge by employing proactive monitoring techniques, including tracking anomalous child processes of entitled daemons such as storagekitd. The techniques used allowed the researchers to identify CVE-2024-44243 and mitigate potential threats before attackers could exploit them on a broader scale.
Though the vulnerability is now patched — Microsoft having only gone public Monday after ensuring that Apple’s security engineers had fixed it — it does highlight that Apple’s longstanding focus on security is starting to fray.
Mayuresh Dani, manager of security research at the Qualys Threat Research Unit, told SiliconANGLE via email that “bypassing SIP could allow threat actors to install rootkits and similar functionality, allowing persistent backdoor to the vulnerable system.”
Dani gave several recommendations on how to mitigate similar macOS SIP bypasses. One is behavioral monitoring special entitlements. Teams, he said, should proactively monitor processes with special entitlements, as these can be exploited to bypass SIP. The behavior of these processes in the environments should also be maintained.
Another is to restrict third-party kernel extensions. Dani suggests limiting applications that use third-party kernel extensions, and they should be enabled only when absolutely necessary and strict monitoring guidelines.
Jason Soroko, senior fellow at certificate lifecycle management company Sectigo Ltd., noted that the vulnerability exposed “the entire operating system to deeper compromise without needing physical access, threatening sensitive data and system controls.”
“Security teams should ensure macOS systems are patched with the latest updates, closely monitor for unusual disk management or privileged process behavior, and implement endpoint detection tools that watch for unsigned kernel extensions,” Soroko added. “Regular integrity checks, principle-of-least-privilege policies and strict compliance with Apple’s security guidelines further reduce exposure to this critical threat.”
Image: SiliconANGLE/Ideogram
Your vote of support is important to us and it helps us keep the content FREE.
One click below supports our mission to provide free, deep, and relevant content.
Join our community on YouTube
Join the community that includes more than 15,000 #CubeAlumni experts, including Amazon.com CEO Andy Jassy, Dell Technologies founder and CEO Michael Dell, Intel CEO Pat Gelsinger, and many more luminaries and experts.
THANK YOU
Enjoy the perfect blend of retro charm and modern convenience with the Udreamer Vinyl Record Player. With 9,041 ratings, a 4.3/5-star average, and 400+ units sold in the past month, this player is a fan favorite, available now for just $39.99.
The record player features built-in stereo speakers that deliver retro-style sound while also offering modern functionality. Pair it with your phone via Bluetooth to wirelessly listen to your favorite tracks. Udreamer also provides 24-hour one-on-one service for customer support, ensuring your satisfaction.
Don’t miss out—get yours today for only $39.99 at Amazon!
Support Techcratic
If you find value in Techcratic’s insights and articles, consider supporting us with Bitcoin. Your support helps me, as a solo operator, continue delivering high-quality content while managing all the technical aspects, from server maintenance to blog writing, future updates, and improvements. Support Innovation! Thank you.
Bitcoin Address:
bc1qlszw7elx2qahjwvaryh0tkgg8y68enw30gpvge
Please verify this address before sending funds.
Bitcoin QR Code
Simply scan the QR code below to support Techcratic.
Please read the Privacy and Security Disclaimer on how Techcratic handles your support.
Disclaimer: As an Amazon Associate, Techcratic may earn from qualifying purchases.