• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
researchers uncover symlink exploit allowing tcc bypass in ios and

Researchers Uncover Symlink Exploit Allowing TCC Bypass in iOS and macOS

You are here: Home / General Cyber Security News / Researchers Uncover Symlink Exploit Allowing TCC Bypass in iOS and macOS
December 12, 2024

Details have emerged about a now-patched security vulnerability in Apple’s iOS and macOS that, if successfully exploited, could sidestep the Transparency, Consent, and Control (TCC) framework and result in unauthorized access to sensitive information.

The flaw, tracked as CVE-2024-44131 (CVSS score: 5.3), resides in the FileProvider component, per Apple, and has been addressed with improved validation of symbolic links (symlinks) in iOS 18, iPadOS 18, and macOS Sequoia 15.

Jamf Threat Labs, which discovered and reported the flaw, said the TCC bypass could be exploited by a rogue installed on the system to grab sensitive data without users’ knowledge.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


TCC serves as a critical security protection in Apple devices, giving end users a way to allow or deny a request from apps to access sensitive data, such as GPS location, contacts, and photos, among others.

Cybersecurity

“This TCC bypass allows unauthorized access to files and folders, Health data, the microphone or camera, and more without alerting users,” the company said. “This undermines user trust in the security of iOS devices and exposes personal data to risk.”

At its core, the vulnerability enables a malicious app running in the background to intercept actions made by the user to copy or move files within the Files app and redirect them to a location under their control.

This hijack works by taking advantage of the elevated privileges of fileproviderd, a daemon that handles file operations associated with iCloud and other third-party cloud file managers, to move the files, after which they can be uploaded to a remote server.

“Specifically, when a user moves or copies files or directories using Files.app within a directory accessible by a malicious app running in the background, the attacker can manipulate symlinks to deceive the Files app,” Jamf said.

“The new symlink attack method first copies an innocent file, providing a detectable signal to a malicious process that the copying has started. Then, a symlink is inserted after the copying process is already underway, effectively bypassing the symlink check.”

An attacker could therefore employ the method to copy, move, or even delete various files and directories under the path “/var/mobile/Library/Mobile Documents/” to access iCloud backup data associated with both first- and third-party apps and exfiltrate them.

What’s significant about this loophole is that it entirely undermines the TCC framework and doesn’t trigger any prompts to the user. That having said, the type of data that can be accessed depends on which system process is executing the file operation.

“The severity of these vulnerabilities depends on the privileges of the targeted process,” Jamf said. “This reveals a gap in access control enforcement for certain data types, as not all data can be extracted without alert due to this race condition.”

Cybersecurity

“For example, data within folders protected by randomly assigned UUIDs and data retrieved through specific APIs remain unaffected by this type of attack.”

The development comes as Apple released updates for all its software to remediate several issues, including four flaws in WebKit that could result in memory corruption or process crash, and a logic vulnerability in Audio (CVE-2024-54529) that could permit an app to execute arbitrary code with kernel privileges.

Also patched by the iPhone maker is a bug in Safari (CVE-2024-44246) that could allow a website to glean the originating IP address when adding it to the Reading List on a device with Private Relay enabled. Apple said it fixed the problem with “improved routing of Safari-originated requests.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «saas budget planning guide for it professionals SaaS Budget Planning Guide for IT Professionals
Next Post: Gamaredon Deploys Android Spyware “BoneSpy” and “PlainGnome” in Former Soviet States gamaredon deploys android spyware "bonespy" and "plaingnome" in former soviet»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • OpenAI Unveils Aardvark: GPT-5 Agent That Finds and Fixes Code Flaws Automatically
  • Nation-State Hackers Deploy New Airstalk Malware in Suspected Supply Chain Attack
  • China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats
  • China-Linked Tick Group Exploits Lanscope Zero-Day to Hijack Corporate Systems
  • The MSP Cybersecurity Readiness Guide: Turning Security into Growth
  • CISA and NSA Issue Urgent Guidance to Secure WSUS and Microsoft Exchange Servers
  • Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery
  • CISA Flags VMware Zero-Day Exploited by China-Linked Hackers in Active Attacks
  • A New Security Layer for macOS Takes Aim at Admin Errors Before Hackers Do
  • Google’s Built-In AI Defenses on Android Now Block 10 Billion Scam Messages a Month

Copyright © TheCyberSecurity.News, All Rights Reserved.