Thursday, February 27, 2025
HomeAppleGoogle Project Zero Released Apple macOS Unpatched Zero-day Exploit PoC Online -...

Google Project Zero Released Apple macOS Unpatched Zero-day Exploit PoC Online – Apple Crossed 90-day Deadline

Published on

SIEM as a Service

Follow Us on Google News

Security Expert from Google Zero Project released a PoC Exploit for Apple macOS kernal zero-day vulnerability that is failed to patch by Apple within 90 days, a deadline of bug disclosure policy followed by Google.

Google built a full-time dedicated Security team, known as Project Zero, that aims to prevent targeted attacks by reporting bugs to software vendors and filing them in an external database.

A bug discovered in macOS XNU kernel that allows attacker to manipulate and change the nature of the file system image on-disk file without informing the virtual management subsystem.

“XNU has various interfaces that permit creating copy-on-write(COW) copies of data between processes, including out-of-line message descriptors in mach messages.”

Copy-on-write ( referred to as “COW”) is an optimization strategy or resource management technique used in computer programming

So the copied memories should be protected from later modifications by the source process, if not then the source process might be able to exploit double-reads in the destination process.

According to Google Project Zero, “This copy-on-write behavior works not only with anonymous memory but also with file mappings. This means that, after the destination process has started reading from the transferred memory area, memory pressure can cause the pages holding the transferred memory to be evicted from the page cache. Later, when the evicted pages are needed again, they can be reloaded from the backing filesystem.”

In this case, Google published the Proof-of-concept that demonstrates this Zero-day flaw and also you can download the exploit here.

“This bug is subject to a 90-day disclosure deadline. After 90 days elapse or a patch has been made broadly available (whichever is earlier), the bug report will become visible to the public.”

Google always following Aggressive disclosure policies makes software vendors to strictly focus on their security bugs and keep them working and fix it as soon as possible.

Google Project zero team contact with Apple regarding this issue, and at this point no fix is available at this time and Apple will be fixed this issue and release the update in future security updates. Google said.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Also Read:

ZDI Exposed Unpatched Microsoft RCE Zero-day Flaw in Public After it Crossed the 120 Days Deadline

Hackers Exploit Cisco Zero Day Vulnerability in Wild Resulting in DoS Condition

Hackers Started Exploiting the Unpatched Windows Task Scheduler Zero Day Flaw using Malware

Apple Released Security Update & Fixes for iOS FaceTime Zero-day Vulnerability

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Lotus Blossom Hacker Group Uses Dropbox, Twitter, and Zimbra for C2 Communications

The Lotus Blossom hacker group, also known as Spring Dragon, Billbug, or Thrip, has...

Squidoor: Multi-Vector Malware Exploiting Outlook API, DNS & ICMP Tunneling for C2

A newly identified malware, dubbed "Squidoor," has emerged as a sophisticated threat targeting government,...

Unpatched Vulnerabilities Attract Cybercriminals as EDR Visibility Remains Limited

Cyber adversaries have evolved into highly organized and professional entities, mirroring the operational efficiency...

Threat Actors Attack Job Seekers of Fortune 500 Companies to Steal Personal Details

In Q3 2024, Cofense Intelligence uncovered a targeted spear-phishing campaign aimed at employees working...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Unpatched Vulnerabilities Attract Cybercriminals as EDR Visibility Remains Limited

Cyber adversaries have evolved into highly organized and professional entities, mirroring the operational efficiency...

New Anubis Ransomware Targets Windows, Linux, NAS, and ESXi x64/x32 Environments

A new ransomware group, dubbed Anubis, has emerged as a significant threat in the...

RustDoor and Koi Stealer Malware Attack macOS to Steal Login Credentials

A new wave of sophisticated cyberattacks targeting macOS systems has been identified, involving two...