Apple fixes macOS zero-day exploited by malware (CVE-2021-30713)
A zero-day vulnerability (CVE-2021-30713) that allowed XCSSET malware to surreptitiously take screenshots of the victim’s desktop has been fixed by Apple on macOS 11.4 (Big Sur) on Monday.
The XCSSET malware and its CVE-2021-30713 exploitation
The malware is written in AppleScript – a scripting language developed by Apple – that facilitates control over script-enabled Mac applications.
“[The TCC framework] is the system that controls what resources applications have access to,” the researchers explained. “From the user’s perspective, TCC is the prompt they receive when a program attempts to perform an action that Apple believes should require explicit permission from the user before allowing the action to occur.”
Users see that prompt when, for example, an app wants to access the computer’s microphone or camera, record the screen, save files to the Documents directory, etc.
XCSSET bypasses the TCC protections by using an AppleScript module to search for an application that has permissions to capture a screenshot and compiling it into a custom AppleScript application (“avatarde.app”) that is injected into that “donor” application.
By doing this, the malware effectively gains the permission to make screenshots without having to ask the user for it. Even worse – the vulnerability can be used to gain multiple other permissions that have already been provided to the donor application.
Update your Mac (and other iDevices)
CVE-2021-30713 has been patched in macOS Big Sur 11.4, which was released on Monday. The updated OS also brings many other security fixes.
At the same time, Apple has also released security updates for macOS Catalina and Mojave, Safari 14.1.1, iOS 14.6 and iPadOS 14.6, tvOS 14.6 and watchOS 7.5. Details about the security content of these updates can be found here.
Users are advised to implement the updates as soon as possible.