Apple's MacOS Mojave, released to users around the world Mday, ctains an improper implementati of security protectis that may expose persal user data, a security researcher said.
Outlined by Patrick Wardle of Digita Security, the apparent error causes a n-privileged app to bypass built-in permissis at system level and limited user information of certain apps. Wardle has uncovered a number of Apple-related security issues, the latest of which is the exfiltrati of sensitive user data through the popular Mac App Store app, Adware Doctor.
Apple has introduced a comprehensive suite of macOS security features at its Worldwide Developers Cference this June, where users have explicit permissi to use certain apps and hardware. In particular, users must allow permissi to access the camera, microphe, e-mailhite, messages, Safari, Time Machine and iTunes backups, locatis, routines and system cookies when running macOS Mojave.
Uploaded in a short video to TwitterWardle demstrates a bypass for at least e of these protectis.
The short demstrati shows a first failed attempt to open and copy ctacts via Terminal, an expected result under Apple's security measures. Wardle then runs an unauthorized app, aptly called "breakMojave," to find and open Mac's address book.
With secure access, Wardle can run a list command to view all files in the private folder, including metadata and images.
Speak with TechCrunchWardle said the exploit is "not a universal bypass" of the extended authorizati functi, but noted that the procedure can be used to access protected data when a user is logged to macOS. As such, it is unlikely that the error will be a major problem for most users, but may be difficult in certain situatis.
The security researcher keeps details of the bug private to protect the general public, but said he was broadcasting the bypass to draw attenti to Apple's lack of bugbounty for Mac. Indeed, a cheeky line in Wardle's scripts, "Submit report to email@example.com … ERROR: macOS bug bounty program not found: /"
Apple is currently running an iOS bug bounty program, launched in 2016, that pays up to $ 200,000 for bugs related to secure boot firmware compents, although the company needs to launch a similar incentives initiative for Mac.
Now that the bug is fixed, Apple will undoubtedly inquire about the details and publish a patch in an upcoming update.