macOS 3rd Party Certificate Vulnerability
This content has been archived
This article no longer conforms to NHS Digital's standards for cyber alerts, and may contain outdated or inaccurate information. Use of this information contained in this page is at your own risk
Summary
Affected platforms
The following platforms are known to be affected:
Threat details
Fat, or Universal, files are used to contain several Mach-O executable files. Products from the affected vendors will check if the first Mach-O file is signed by Apple (or another trusted party) before running all Mach-O files. This means that that any unsigned files contained within the Fat file will be executed, provided the first file is signed.
An attacker may exploit this to bypass regular security protections, which can prevent unsigned files from running.
For further information
- Okta - A Public Disclosure of Issues Around Third Party Code Signing Checks
- Facebook - CVE-2018-6336
- FSecure (xFence, LittleFlocker) - CVE-2018-10403
- Objective See (WhatsYourSign, PRocInfo, KnocKnock, LuLu, TaskExplorer, etc) - CVE-2018-10404
- Google - CVE-2018-10405
- Yelp (OSXCollector) - CVE-2018-10406
- Carbon Black - CVE-2018-10407
- VirusTotal - CVE-2018-10408
- Objective Development (LittleSnitch) - CVE-2018-10470
Remediation steps
CVE Vulnerabilities
Last edited: 17 February 2020 12:47 pm