Vulnerabilities / Threats

6/12/2018
03:33 PM
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
50%
50%

MacOS Bypass Flaw Lets Attackers Sign Malicious Code as Apple

A security bypass weakness in macOS APIs let attackers impersonate Apple to sign malicious code and evade third-party security tools.

When is Apple-signed code not actually signed by Apple? When a hacker can manipulate the code-signing process to impersonate Apple and sign off on malicious code, bypassing common third-party security tools and tricking users into thinking illegitimate software is verified.

Such a bypass attack has been possible for years on macOS and older versions of OS X, thanks to a flaw in Apple code-signing APIs, explains Josh Pitts, staff engineer for research and exploitation at Okta. Pitts discovered the bypass flaw in third-party developers' interpretation of the APIs, which let unsigned malicious code appear as though it was verified by Apple and remain on a Mac until it was patched.

Operating systems use digital signatures to verify whether the code has been signed off by a trusted origin and hasn't been modified. Security tools use signed code for whitelisting, antivirus, incident response, and threat hunting. Detection and response teams use it to weed out untrusted code. The way many macOS security tools verify signatures has been fairly simple to bypass. As a result, popular security tools think Apple signed off on code when it hasn't.

"This really worried me a lot," says Pitts. "This allows an attacker to stay on a workstation … it's a nice way to hide in plain sight."

An attacker wouldn't need administrative access or memory corruption to bypass these code-signing checks, but several conditions need to be in place before an exploit would work.

Digging into the Details

On Windows, you can cryptographically sign "just about everything" from .NET binaries to PowerShell scripts, Pitts explains. On macOS and iOS, code signing focuses on the Mach-O binary and application bundles, which make sure only trusted code is executed in memory.

Here, the flaw exists in the difference between how the Mach-O loader loads signed code, and how improperly used code-signing APIs check the code. Attackers can exploit the vulnerability with a malformed Universal/Fat Binary, which is a binary format containing several Mach-O files. Each of these files targets a CPU architecture (i386, x86_64, PPC), found on Macs.

The following must be true for an exploit to work: Only the first Mach-O in the Fat/Universal file has to be signed by Apple. The malicious binary, or non-Apple code, must be adhoc signed and i386 compiled for an x86_64 bit target machine. The CPU_TYPE in the Fat header of the Apple binary must be set to an invalid type or CPU type not native to the host chipset.

Developers typically check the Mach-O binary or Fat/Universal binary with these APIs: SecStaticCodeCheckValidityWithErrors() or SecStaticCodeCheckValidity(). Flags -- kSecCSStrictValidate and KSecCSCheckAllArchitectures. The flags are supposed to ensure all code is cryptographically signed. However, Pitts says, the APIs "fall short by default."

Apple's code-signing APIs check the first binary for who signed the code, and then check the following binaries in the Fat/Universal file without verifying the CA root of trust. As a result, malicious code could slip past security software and get onto a target Mac. Third-party security, forensics, and incident response tools that use the official code-signing APIs are potentially affected.

An attacker could begin a successful bypass through a file-sharing or phishing attack. Once they're in, "whatever the user has access to, the malware can get access to," Pitts explains. This could include sensitive files containing personally identifiable information or financial data.

"To undermine a code signing implementation for a major OS would break a core security construct that many depend on for day to day security operations," writes Pitts in a blog post.

Affected Vendors and Available Patches

Security tools built into macOS are not exposed, and affected vendors and open-source projects have been alerted to the bypass, Okta reports. Developers are responsible for properly using the code-signing API, and POCs are released to help test their code.

Here are the affected vendors:

  • VirusTotal (CVE-2018-10408)
  • Google - Santa, molcodesignchecker (CVE-2018-10405)
  • Facebook - OSQuery (CVE-2018-6336)
  • Objective Development - LittleSnitch (CVE-2018-10470)
  • F-Secure - xFence, also LittleFocker (CVE-2018-10403)
  • Objective-See - WhatsYourSign, ProcInfo, KnockKnock, LuLu, TaskExplorer, others (CVE-2018-10404)
  • Yelp - OSXCollector (CVE-2018-10406)
  • Carbon Black - Cb Response (CVE-2018-10407)

Mac users should apply all necessary fixes to protect against malicious software that tries to manipulate the code-signing process. "If enterprises are using illicit software, they need to update," Pitts emphasizes.

Related Content:

 

Top industry experts will offer a range of information and insight on who the bad guys are – and why they might be targeting your enterprise. Click for more information

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
12 Free, Ready-to-Use Security Tools
Steve Zurier, Freelance Writer,  10/12/2018
Most IT Security Pros Want to Change Jobs
Dark Reading Staff 10/12/2018
Most Malware Arrives Via Email
Dark Reading Staff 10/11/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-17534
PUBLISHED: 2018-10-15
Teltonika RUT9XX routers with firmware before 00.04.233 provide a root terminal on a serial interface without proper access control. This allows attackers with physical access to execute arbitrary commands with root privileges.
CVE-2018-17980
PUBLISHED: 2018-10-15
NoMachine before 5.3.27 and 6.x before 6.3.6 allows attackers to gain privileges via a Trojan horse wintab32.dll file located in the same directory as a .nxs file, as demonstrated by a scenario where the .nxs file and the DLL are in the current working directory, and the Trojan horse code is execute...
CVE-2018-18259
PUBLISHED: 2018-10-15
Stored XSS has been discovered in version 1.0.12 of the LUYA CMS software via /admin/api-cms-nav/create-page.
CVE-2018-18260
PUBLISHED: 2018-10-15
In the 2.4 version of Camaleon CMS, Stored XSS has been discovered. The profile image in the User settings section can be run in the update / upload area via /admin/media/upload?actions=false.
CVE-2018-17532
PUBLISHED: 2018-10-15
Teltonika RUT9XX routers with firmware before 00.04.233 are prone to multiple unauthenticated OS command injection vulnerabilities in autologin.cgi and hotspotlogin.cgi due to insufficient user input sanitization. This allows remote attackers to execute arbitrary commands with root privileges.