![]() ![]() Full Securityįull Security is the default setting, offering the highest level of security. Use these settings to make sure your Mac always starts up from a legitimate, trusted operating system. If you haven’t updated your Mac yet, make sure you install the latest version of macOS as soon as possible by going to System Settings > General > Software Update.You can also disallow booting from external or removable media to prevent even those who know the firmware password from starting up from such media. Apple thanked the Microsoft researchers on its security webpage. That’s because Microsoft informed Apple about the exploit, which was fixed with the macOS 13.4 update – released on May 18 to the public. Luckily, you don’t have to worry if your Mac is running the latest version of macOS Ventura. As a result, the Mac would import the data from that malicious backup. So the researchers created an AppleScript that automatically mounted this backup and interacted with the Migration Assistant interface without the user even noticing. To take the exploit even further, Microsoft has created a small 1GB Time Machine backup that could have malware on it. But even running in the macOS environment, this would still require having a disk to be restored and interaction with the interface. Since Setup Assistant was running in debug mode, the researchers could easily skip the steps of the setup process and jump straight to Migration Assistant. What the security researchers then did was to run Setup Assistant (the app that guides the user through the first setup of a Mac) in debug mode, so that it would ignore the fact that Migration Assistant had been modified and lacked a valid signature. ![]() But modifying the app caused it to crash due to a codesign failure. Microsoft has modified the Migration Assistant utility to run without logging the user off. But to demonstrate the potential risk of this exploit, Microsoft showed that there was a way to take advantage of it without worrying about the limitations listed before. ![]() In a normal situation, the Migration Assistant tool is only accessible during the setup process of a new user account, which means that hackers not only need to force a complete system sign-out, but also need to have physical access to the computer. The exploit was able to do this using a special entitlement designed to give unrestricted root access to the Migration Assistant app. The exploit is so named because it’s related to the macOS Migration Assistant, a native tool that helps users move data from a Mac or Windows PC to another Mac.Īs Microsoft explained, bypassing SIP can lead to “serious consequences,” since this gives attackers access to all system files, which makes it easy to install malware and rootkits. Microsoft details how it found the ‘Migraine’ exploit in macOSĪs the company shared on its Security blog, a vulnerability named “Migraine” could bypass macOS’ System Integrity Protection and lead to arbitrary code execution on a device. But Microsoft found an exploit that could let attackers bypass SIP. While users can manually disable this feature, it’s not exactly easy to do so. Apple introduced System Integrity Protection (SIP) with OS X El Capitan in 2015, and it essentially adds multiple layers of security that blocks apps from accessing and modifying system files at a root level. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |