Shocking macOS Flaw Exposed: Hackers Can Install Malicious Drivers!
2025-01-13
Author: Siti
In a startling revelation, Apple has recently patched a significant macOS vulnerability that could enable attackers to bypass System Integrity Protection (SIP), making it alarmingly easy for them to install malicious kernel drivers by loading unverified third-party kernel extensions.
For those who may not be familiar, System Integrity Protection, commonly referred to as SIP, is a crucial security feature in macOS. It acts as a shield, blocking destructive software from making changes to protected areas of the operating system by restricting the capabilities of the root user account. SIP only allows processes that are signed by Apple or carry special entitlements — which include official Apple software updates — to alter these secured components. Normally, disabling SIP requires a startup restart into macOS Recovery mode, necessitating physical access to the machine.
However, a newly identified security flaw, labeled CVE-2024-44243, poses a serious risk. This vulnerability can only be exploited by local attackers who already have root privileges, meaning the attacks have a low complexity and require some form of user interaction. Discovered in the Storage Kit daemon responsible for managing disk states, this critical weakness could allow hackers to circumvent SIP’s protections without any physical access to the compromised device. The implications are grave, as successful exploitation might lead to the installation of rootkits — a type of malware that operates undetected, creating persistent and 'undeletable' threats, while also enabling circumvention of Transparency, Consent, and Control (TCC) security checks, potentially exposing sensitive user data to unauthorized access.
This vulnerability was recently addressed in security updates for macOS Sequoia 15.2, released on December 11, 2024. Microsoft weighed in on this issue, emphasizing that SIP is crucial for safeguarding against cyber threats. They highlighted in a recent report that “bypassing SIP jeopardizes the entire operating system’s security and could lead to severe consequences,” stressing the need for robust security mechanisms capable of detecting unusual behavior from authorized processes.
Interestingly, this isn't the first time that SIP vulnerabilities have come to light. Microsoft’s security team has unveiled several such weaknesses in macOS over the years. Notably, the previous SIP bypass known as 'Shrootless' (CVE-2021-30892) discovered back in 2021 gave attackers the ability to carry out arbitrary commands on compromised Macs, while another vulnerability dubbed 'Migraine' (CVE-2023-32369) and the Achilles vulnerability (CVE-2022-42821) have also emerged as significant threats, capable of deploying malware through untrusted applications by bypassing Gatekeeper restrictions.
As cyber threats continue to evolve, the importance of maintaining rigorous security practices cannot be emphasized enough. Users are urged to remain vigilant and promptly apply the latest updates to safeguard their systems against potential exploitation by malicious entities. Stay safe and secure out there!