TLDR:
- A critical flaw in macOS allows unauthorized users to escalate privileges and gain root access.
- The flaw exploits the “diskutil” command line utility and has been fixed by Apple in recent security updates.
A critical flaw impacting macOS has been uncovered that gives unauthorized users, including those with guest access, the capacity to escalate privileges and take complete root control of the system. The flaw, known as CVE-2023-42931, exploits the “diskutil” command line utility, allowing local users to mount filesystems with specific settings that may escalate privileges. Two mount options, “owners/noowners” and “suid/nosuid,” can trigger privilege escalation by changing root-owned files in the system. The attacker can bypass the system integrity protection mechanism by mounting a filesystem with specific options using the “diskutil” command.
Sensitive system files and directories are usually protected by SIP, but the researcher was able to identify a vulnerability by using a “.file” placeholder file in the root filesystem. The affected macOS versions are Sonoma before 14.2, Ventura before 13.6.3, and Monterey before 12.7.2. Apple has released patches for these versions.
It is essential for macOS users to patch their systems promptly to prevent potential attacks exploiting this flaw. Stay updated on cybersecurity news and follow industry best practices to enhance your system’s security.