Exploits on macOS are patched pretty quickly, although it doesn’t stop new bugs and glitches from being spotted. Developer Samuel Groß managed to reveal an exploit on macOS that allowed Safari to get control of the Touch Bar on the MacBook Pro.
Groß managed to showcase the exploits on the first day of the Pwn2Own ethical hacking conference held by TippingPoint, a security services provider. Spotting this exploit earned him $65,000 as a reward as well as 6 points which will go towards Master of Pwn.
These exploits are used by TippingPoint to determine what bugs need to be patched with their own software before manufacturers issue a detailed patch. As a result, ethical hackers are given a reward for showcasing the exploit. This will also prompt Apple to patch the bug with the upcoming update to macOS.
Since we are on the topic of bugs and exploits within macOS, Check Point Research independently revealed some vulnerabilities within the macOS Chrome Remote Desktop app. This bug is considered to be more severe than the Safari exploit as it allows access to the Admin account without requiring a password.
What’s odd is that the research firm reportedly shared the details of this bug with Google a month ago, although nothing has been done about it yet with Google reportedly claiming “the login screen is not a security boundary”. This indicates that Google is fully aware of the issue and doesn’t consider it a big enough threat. However, it is hoped that the company will add the necessary patches with any future update to the Chrome Remote Desktop client.
The process was explained by the security firm:
“What is expected to happen is that the local user that connects remotely to a macOS machine will receive the desktop of a ‘Guest’. But while this is what appears in the remote machine, the local machine (the Chrome extension) receives the desktop of the other active user session, which in this case is an admin on the system, without ever entering the password.”
Determining bugs ahead of time gives ample time for security firms to roll out services designed to squash them. Customers have very little to worry about, though, as companies usually take note of any vulnerability and patch them accordingly.
[Via Cult of Mac]