A researcher going by the name “Siguza” unveiled a 15-year-old security vulnerability in Apple’s macOS operating system that could allow an attacker to fully compromise the system. The researcher also published proof-of-concept zero-day code to his GitHub page.
The flaw was called “IOHIDeous” by the researcher because it’s a vulnerability in the IOHIDFamily kernel extension that can be exploited by an unprivileged user. According to him, this kernel extension has been the culprit of many macOS security bugs in the past.
Siguza said he was looking for a “low-hanging fruit” bug in the iOS operating system, which shares the kernel with macOS. However, what he found is that some parts of IOHIDFamily exist exclusively for macOS. More specifically, it was the IOHIDSystem in which he found the flaw.
Attackers that exploit this flaw would need physical access to the user’s machine or some other way to exploit the machine first. Once the attackers are inside the machine, they can gain root privileges through this flaw, which means they will have full control of the system.
Normally, the attack works by logging out the user first, an action that could raise the alarm bells for users. However, this could be easily hidden by waiting for the users to log out or do a restart of the machine on their own. That’s when the attacker is able to obtain root privileges.
Patch May Not Come Quickly
Siguza didn’t contact Apple about the bug ahead of time and he published the bug in the last day of 2017, which means it will take some time for Apple’s security team to investigate the issue and release a patch.
The researcher released a proof-of-concept and more details about how someone could exploit and take over macOS machines. The proof-of-concept code specifically targets macOS High Sierra to show that the latest kernel protections don't work against it. The code should help Apple develop a fix faster, but at the time time this also made it easier for attackers to incorporate the flaw into their exploit tools.