Library Injection Attacks Target macOS Microsoft Apps

SeniorTechInfo
2 Min Read

Are Microsoft Applications on macOS Vulnerable to Attacks?

New research by Cisco Talos has revealed that eight Microsoft applications for macOS are susceptible to library injection attacks. This could potentially give hackers access to app permissions and compromise sensitive data.

The affected Microsoft apps include popular services like Microsoft Teams, Outlook, PowerPoint, and Word, with eight CVE numbers assigned to each vulnerability.

  • Microsoft Outlook: CVE-2024-42220
  • Microsoft Teams (work or school): CVE-2024-42004
  • Microsoft PowerPoint: CVE-2024-39804
  • Microsoft OneNote: CVE-2024-41159
  • Microsoft Excel: CVE-2024-43106
  • Microsoft Word: CVE-2024-41165
  • Microsoft Teams (work or school) WebView.app helper app: CVE-2024-41145
  • Microsoft Teams (work or school) com.microsoft.teams2.modulehost.app: CVE-2024-41138

These vulnerabilities could allow attackers to exploit macOS’ permission model, bypassing security protocols and accessing app functions without user consent. This could lead to unauthorized activities such as sending emails, recording audio or video, without the user’s knowledge.

macOS’ Consent-Based Permission Model Under Threat

Cisco Talos highlighted macOS’ consent-based permission model designed to protect users’ privacy and system security. However, the research found that the eight Microsoft macOS apps have a specific entitlement that allows the loading of unsigned plug-ins, posing a significant security risk.

The presence of this entitlement disables crucial runtime security features, making the apps vulnerable to library injection attacks. While Microsoft has updated four apps to address this issue, Excel, Outlook, PowerPoint, and Word remain at risk as of August 19, 2024.

Ensuring User Security on macOS

The researchers recommended macOS introduce a user prompt for loading third-party plug-ins to mitigate this risk. This would provide users with more control over granting access to potentially vulnerable apps.

Image credit: Koshiro K / Shutterstock.com

Share This Article
Leave a comment

Leave a Reply

Your email address will not be published. Required fields are marked *