Critical vulnerability discovered in OS X

Pedro Vilaa, a researcher from specialising in Mac OS X at SentinelOne, claims to have found a critical flaw in all versions of the desktop operating system that can bypass all Apple's built-in security measures, notably System Integrity Protection.

According to Vilaa, who will be presenting his findings today at SysCan360 2016 in Singapore, the flaw is a non-memory corruption bug that allows for local privilege escalation by executing arbitrary code on any binary.

"We informed Apple of the vulnerability and it has since been patched with El Capitan 10.11.4 and iOS 9.3. However, from Apple's Security Bulletin, it seems that other versions do not appear to have a patch for this specific bug, which could suggest that they are still left vulnerable to this specific bug," Vilaa told IT Pro. "The only real way to mitigate this threat is to upgrade to El Capitan 10.11.4. Anything else is left vulnerable to an attack."

IT Pro contacted Apple for further clarification but had not received a response at the time of publication.

According to SentinelOne, any exploitation of the flaw would require the attacker to compromise the system, which could be achieved via spearphishing or exploiting the user's browser. Once this first step had been carried out, the attack on the OS itself would be "virtually impossible" to detect.

"The nature of this particular exploit enables it to evade defenses by utilising very reliable and stable techniques that traditional detection mechanisms, looking for more obvious warning signs, would miss," the company said, adding it "could typically be used in highly targeted or state sponsored attacks".

A bad week for Apple

It has been a bad week for Apple when it comes to bugs in its operating systems. Just a few days ago, Johns Hopkins University discovered a serious flaw in Apple's iMessage platform that could give attackers access to visual media sent via the service.

It was also revealed midweek that the FBI may no longer need the help of Apple to break into an iPhone 5c belonging to one of the San Bernardino shooters after an "outside party", allegedly Israeli data forensics firm Cellebrite, came forward with a way to access the data held on the device.

Jane McCallion
Deputy Editor

Jane McCallion is ITPro's deputy editor, specializing in cloud computing, cyber security, data centers and enterprise IT infrastructure. Before becoming Deputy Editor, she held the role of Features Editor, managing a pool of freelance and internal writers, while continuing to specialise in enterprise IT infrastructure, and business strategy.

Prior to joining ITPro, Jane was a freelance business journalist writing as both Jane McCallion and Jane Bordenave for titles such as European CEO, World Finance, and Business Excellence Magazine.