Vulnerabilities in Microsoft’s macOS apps could help hackers access microphones and cameras

Avatar

Researchers said they discovered eight vulnerabilities in a range of Microsoft applications for macOS, including Teams, Outlook, Word, PowerPoint, OneNote and Excel, that could allow an attacker to gain access to a user’s “microphone, camera, folders, screen recording, user input and more.”

According to a blog post published Monday by Cisco Talos, if users have already given those apps permission to access device resources then the way Microsoft has designed its apps means hackers could exploit them to secretly record video or audio without users’ knowing.

“If a trusted application is compromised, it might be manipulated to abuse its permissions, allowing attackers to perform actions without user knowledge. For instance, if a video chat app with camera and microphone access is exploited, it could be forced to record without alerting the user,” warned Cisco.

The vulnerabilities are all linked to library injection — a technique that macOS defends against with Hardened Runtime, a setting that restricts the loading of risky libraries that could contain malicious code.

However, as the setting also restricts some capabilities that apps can depend on, Apple advises developers they can “add an entitlement to disable an individual protection” to ensure their apps’ functionality.

Cisco argues that Microsoft has added entitlements for the affected apps, disabling some of the protections provided by Hardened Runtime — and has done so unnecessarily.

The entitlement used by Microsoft is intended to allow apps to load plug-ins signed by third-party developers, Cisco stated: “Yet, as far as we know, the only ‘plug-ins’ available to Microsoft’s macOS apps are web-based and known as ‘Office add-ins.’

“If this understanding is correct, it raises questions about the necessity of disabling library validation, especially if no additional libraries are expected to be loaded. By using this entitlement, Microsoft is circumventing the safeguards offered by the hardened runtime, potentially exposing its users to unnecessary risks,” states the blog.

Microsoft considers the issues “low risk,” according to Cisco. But following the report, Microsoft updated its Teams apps and OneNote to remove the entitlement and thus the potential vulnerability.

The blog states that Excel, Outlook, PowerPoint and Word remain vulnerable and warns these “leave the door open for adversaries to exploit all of the apps’ entitlements and, without any user prompts, reuse all the permissions already granted to the app, effectively serving as a permission broker for the attacker.”

Microsoft and Apple did not immediately respond to a request for comment.

CybercrimeIndustryNewsNews BriefsTechnology
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Alexander Martin

is the UK Editor for Recorded Future News. He was previously a technology reporter for Sky News and is also a fellow at the European Cyber Conflict Research Initiative.

 

Total
0
Shares
Previous Post

Cybercriminals siphon credit card numbers from Oregon Zoo website

Next Post

Russia-linked Vermin hackers target Ukraine with new malware strain

Related Posts

TrickMo Banking Trojan Can Now Capture Android PINs and Unlock Patterns

New variants of an Android banking trojan called TrickMo have been found to harbor previously undocumented features to steal a device's unlock pattern or PIN. "This new addition enables the threat actor to operate on the device even while it is locked," Zimperium security researcher Aazim Yaswant said in an analysis published last week. First spotted in the wild in 2019, TrickMo is so named for
Avatar
Read More