MacOS Archive Utility Bug Lets Malicious Apps Bypass Security Checks

  /     /     /  
Publicated : 23/11/2024   Category : security


MacOS Archive Utility Bug Lets Malicious Apps Bypass Security Checks


Exploit allows unsigned and unnotarized macOS applications to bypass Gatekeeper and other security, without notifying the user.



New details about a known vulnerability in the macOS Archive Utility have emerged, showing that a cyberattacker armed with just the right specialty archive could exploit it to execute a malicious application while bypassing security checks — without the user ever being notified. 
The vulnerability, discovered by Jamf Threat Labs and tracked as CVE-2022-32910, affects the 
Archive Utility
, an Apple tool that allows users to easily create and send archives. The team said it discovered the flaw during research into general archiving feature security. 
Although our testing was done with Apple Archives, the same bypass can be achieved with other archive formats such as .ZIP archives, in which case the .ZIP file could be created while within the app directory, the disclosure noted. 
The Jamf team reported the
macOS bug
to Apple on May 31 and said Apple issued a patch on July 20 — but its just now releasing technical details. Out-of-date end users should update to the latest macOS version to avoid compromise.

Last News

▸ Some DLP Products Vulnerable to Security Holes ◂
Discovered: 23/12/2024
Category: security

▸ Scan suggests Heartbleed patches may not have been successful. ◂
Discovered: 23/12/2024
Category: security

▸ IoT Devices on Average Have 25 Vulnerabilities ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
MacOS Archive Utility Bug Lets Malicious Apps Bypass Security Checks