Skip to content
Up To Date Time

Up To Date Time

  • Home
  • Sports
  • cryptocurrency
  • Technology
  • Virtual Reality
  • Education Law
  • More
    • About Us
    • Contact Us
    • Disclaimer
    • Privacy Policy
    • Terms and Conditions
  • Toggle search form
Apple fixes macOS flaw that let attackers bypass system protections

Apple fixes macOS flaw that let attackers bypass system protections

Posted on January 15, 2025 By rehan.rafique No Comments on Apple fixes macOS flaw that let attackers bypass system protections

Update your Mac as soon as possible


Apple fixes macOS flaw that let attackers bypass system protections

A macOS vulnerability exposed Apple devices to severe security risks by bypassing System Integrity Protection, but a security patch has killed the exploit.

On January 13, 2025, Microsoft Threat Intelligence revealed a critical vulnerability in macOS — CVE-2024-44243 — that bypasses Apple’s System Integrity Protection (SIP) by exploiting third-party kernel extensions. This issue, now patched, could have allowed attackers to compromise macOS security at its core.

System Integrity Protection (SIP) is a macOS security feature designed to safeguard critical system files and processes. It restricts even users with administrative privileges from making changes that could compromise the operating system’s stability and security.

SIP protects sensitive system files, prevents arbitrary kernel code execution, and ensures apps can’t load unauthorized kernel drivers.

CVE-2024-44243 showed how attackers could bypass SIP protections by loading malicious third-party kernel extensions called rootkits. Rootkits grant unauthorized access, install persistent malware, bypass user permissions, and tamper with security mechanisms.

How CVE-2024-44243 works

The vulnerability relies on “entitlements,” which are special permissions embedded in macOS processes. These entitlements are important to SIP as they govern what a process can and cannot do.

Terminal output displaying storagekitd entitlements, including Apple code signing authorities and rootless-related keys like install, install.heritable, and volume.iSCPreboot.
Storagekitd and its entitlements. Image credit: Microsoft

Some processes have private entitlements reserved for essential system functions, such as debugging or file management.

Microsoft researchers discovered that attackers could exploit entitled processes — specifically the storagekitd daemon, which manages disk state through Apple’s Storage Kit framework. Since storagekitd inherits broad privileges, it could spawn child processes capable of bypassing SIP.

Attackers could insert their own kernel extensions to gain control over the operating system without detection using the daemon.

After identifying the vulnerability, Microsoft disclosed it to Apple under its Coordinated Vulnerability Disclosure (CVD) process. Apple addressed CVE-2024-44243 in its December 11, 2024 security updates, urging all users to update their Macs immediately.

How to protect your Mac

The best way to protect your Mac from this vulnerability is to make sure it’s running the latest macOS update. Apple fixed the issue in its December 11, 2024, security patches, so it’s crucial to update if you haven’t already.

To check, head to System Settings > General > Software Update and install any available updates.

If you’re using an older Mac that doesn’t support the latest macOS, keep an eye on Apple’s security updates for patches that might still apply to your system. It’s also a good idea to avoid installing third-party kernel extensions unless you’re sure they come from a trusted source.

You won’t have to worry about accidentally disabling SIP. It’s enabled by default in macOS, and disabling it requires deliberate steps using Terminal in Recovery Mode.

Technology

Post navigation

Previous Post: Indian women’s cricket team thrashes Ireland by biggest margin to whitewash series by 3-0
Next Post: The XR Week Peek (2025.01.15): Many XR devices were at CES, Quest 3S is the most sold console of 2024, and more!

More Related Articles

Yes, the AI Bubble is Real… But it Doesn’t Matter Yes, the AI Bubble is Real… But it Doesn’t Matter Technology
Outsourcing:  A Growing Solution Outsourcing: A Growing Solution Technology
Tips to Keep Your Phone Protected from Cybercriminals – Inner PC Computer Solutions Tips to Keep Your Phone Protected from Cybercriminals – Inner PC Computer Solutions Technology
Top 5 Enterprise Backup Solutions For Nutanix Top 5 Enterprise Backup Solutions For Nutanix Technology
Exploring the Realm of Form Control:Git and GitHub Preparing Session at PUSOE/PUSAT College Exploring the Realm of Form Control:Git and GitHub Preparing Session at PUSOE/PUSAT College Technology
Pixel 9’s Awesome New Setup Process is Coming to Other Android Phones Pixel 9’s Awesome New Setup Process is Coming to Other Android Phones Technology

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts

  • Ethereum NFT Sales Skyrocket, Nearing $4K ETH Milestone!
  • The XR Week Peek (2025.07.21): Bytedance may be working on an MR headset, HTC teases a new product, and more!
  • Apple enhances M5 iPad Pro with more cameras, thinner bezels
  • Pacquiao says he’s going to rumble some more
  • ChatGPT Analyzes ROI Potential for Shiba Inu, XRP, and Little Pepe (LILPEPE) in 2025: Here’s Where to Invest

Categories

  • cryptocurrency
  • Education Law
  • Sports
  • Technology
  • Virtual Reality

Copyright © 2025 Up To Date Time.

Powered by PressBook Blog WordPress theme