Vulnerabilities in Microsoft’s macOS apps could help hackers access microphones and cameras

Avatar

Researchers said they discovered eight vulnerabilities in a range of Microsoft applications for macOS, including Teams, Outlook, Word, PowerPoint, OneNote and Excel, that could allow an attacker to gain access to a user’s “microphone, camera, folders, screen recording, user input and more.”

According to a blog post published Monday by Cisco Talos, if users have already given those apps permission to access device resources then the way Microsoft has designed its apps means hackers could exploit them to secretly record video or audio without users’ knowing.

“If a trusted application is compromised, it might be manipulated to abuse its permissions, allowing attackers to perform actions without user knowledge. For instance, if a video chat app with camera and microphone access is exploited, it could be forced to record without alerting the user,” warned Cisco.

The vulnerabilities are all linked to library injection — a technique that macOS defends against with Hardened Runtime, a setting that restricts the loading of risky libraries that could contain malicious code.

However, as the setting also restricts some capabilities that apps can depend on, Apple advises developers they can “add an entitlement to disable an individual protection” to ensure their apps’ functionality.

Cisco argues that Microsoft has added entitlements for the affected apps, disabling some of the protections provided by Hardened Runtime — and has done so unnecessarily.

The entitlement used by Microsoft is intended to allow apps to load plug-ins signed by third-party developers, Cisco stated: “Yet, as far as we know, the only ‘plug-ins’ available to Microsoft’s macOS apps are web-based and known as ‘Office add-ins.’

“If this understanding is correct, it raises questions about the necessity of disabling library validation, especially if no additional libraries are expected to be loaded. By using this entitlement, Microsoft is circumventing the safeguards offered by the hardened runtime, potentially exposing its users to unnecessary risks,” states the blog.

Microsoft considers the issues “low risk,” according to Cisco. But following the report, Microsoft updated its Teams apps and OneNote to remove the entitlement and thus the potential vulnerability.

The blog states that Excel, Outlook, PowerPoint and Word remain vulnerable and warns these “leave the door open for adversaries to exploit all of the apps’ entitlements and, without any user prompts, reuse all the permissions already granted to the app, effectively serving as a permission broker for the attacker.”

Microsoft and Apple did not immediately respond to a request for comment.

CybercrimeIndustryNewsNews BriefsTechnology
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Alexander Martin

is the UK Editor for Recorded Future News. He was previously a technology reporter for Sky News and is also a fellow at the European Cyber Conflict Research Initiative.

 

Total
0
Shares
Previous Post

Cybercriminals siphon credit card numbers from Oregon Zoo website

Next Post

Russia-linked Vermin hackers target Ukraine with new malware strain

Related Posts

Researchers Discover Command Injection Flaw in Wi-Fi Alliance’s Test Suite

A security flaw impacting the Wi-Fi Test Suite could enable unauthenticated local attackers to execute arbitrary code with elevated privileges. The CERT Coordination Center (CERT/CC) said the vulnerability, tracked as CVE-2024-41992, said the susceptible code from the Wi-Fi Alliance has been found deployed on Arcadyan FMIMG51AX000J routers. "This flaw allows an unauthenticated local attacker to
Avatar
Read More

North Korean Group Collaborates with Play Ransomware in Significant Cyber Attack

Threat actors in North Korea have been implicated in a recent incident that deployed a known ransomware family called Play, underscoring their financial motivations. The activity, observed between May and September 2024, has been attributed to a threat actor tracked as Jumpy Pisces, which is also known as Andariel, APT45, DarkSeoul, Nickel Hyatt, Onyx Sleet (formerly Plutonium), Operation Troy,
Avatar
Read More