August 16, 2022



Microsoft Particulars App Sandbox Escape Bug Impacting Apple iOS, iPadOS, macOS Units

2 min read

Microsoft on Wednesday clarify a now patched security vulnerability affecting Apple’s working strategies that, if effectively exploited, would possibly allow attackers to escalate gadget privileges and deploy malware.

“An attacker would possibly profit from this sandbox escape vulnerability to comprehend elevated privileges on the affected gadget or execute malicious directions like placing in further payloads,” Jonathan Bar Or of the Microsoft 365 Defender Analysis Staff stated in a write-up.

Tracked as CVE-2022-26706 (CVSS ranking: 5.5), the security vulnerability impacts iOS, iPadOS, macOS, tvOS, and watchOS and was fixed by Apple in Might 2022.

Calling it an entry concern affecting the LaunchServices (launchd) factor, the tech large well-known that “A sandboxed course of may presumably circumvent sandbox restrictions,” together with it mitigates the problem with further restrictions.

Whereas Apple’s App Sandbox is designed to tightly regulate a third-party app’s entry to system property and client data, the vulnerability makes it doable to bypass these restrictions and compromise the machine.

“The sandbox’s main function is to incorporate damage to the system and the patron’s data if the patron executes a compromised app,” Apple explains in its documentation.

“Whereas the sandbox wouldn’t forestall assaults in direction of your app, it does reduce the damage a worthwhile assault might trigger by limiting your app to the minimal set of privileges it requires to function accurately.”

Microsoft talked about it discovered the flaw all through its makes an try to find out a way to flee the sandbox and execute arbitrary directions on macOS by concealing the malicious code in a particularly crafted Microsoft Workplace macro.


Particularly, the tweet-sized proof-of-concept (PoC) devised by the tech large leverages Launch Providers as a way to run an open command — a utility used to open recordsdata and launch apps — on a Python payload containing rogue instructions.

However it’s worth noting that any file dropped by a sandboxed app is mechanically hooked as much as the “” extended attribute so as to set off a fast requiring categorical client’s consent earlier to execution.

See also  Apple follows up ‘resilient’ earnings, swift iPhone gross sales with debt deal that would attain $6.5 billion

This constraint, however, could possibly be eradicated by utilizing the -stdin selection for the open command associated to the Python exploit file.

“–stdin bypassed the ‘’ extended attribute restriction, as there was no method for Python to know that the contents from its commonplace enter originated from a quarantined file,” Bar Or talked about.

Copyright © All rights reserved. | Newsphere by AF themes.