CVE-2018-10171
📋 TL;DR
CVE-2018-10171 is a critical privilege escalation vulnerability in MacKeeper 3.20.4 that allows unprivileged applications to execute arbitrary shell commands as root through a vulnerable XPC service. This affects all Mac users running the vulnerable version of MacKeeper software. Attackers can gain complete control of affected systems without authentication.
💻 Affected Systems
- Kromtech MacKeeper
📦 What is this software?
Mackeeper by Kromtech
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with root access, allowing installation of persistent malware, data theft, and full control over the macOS system.
Likely Case
Local attackers or malware gaining root privileges to install additional payloads, modify system files, or establish persistence.
If Mitigated
Limited impact if MacKeeper is not installed or properly updated, though any vulnerable installation remains at high risk.
🎯 Exploit Status
Exploitation requires local access but is straightforward once an attacker has user-level access. The XPC service flaw makes exploitation simple.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Versions after 3.20.4
Vendor Advisory: https://mackeeper.com/blog/post/security-update
Restart Required: No
Instructions:
1. Open MacKeeper application
2. Check for updates in settings
3. Install any available updates
4. Verify version is newer than 3.20.4
🔧 Temporary Workarounds
Remove vulnerable component
allRemove the vulnerable AdwareAnalyzerPrivilegedHelper XPC service
sudo rm -rf /Library/PrivilegedHelperTools/com.mackeeper.AdwareAnalyzer.AdwareAnalyzerPrivilegedHelper
sudo rm -rf /Library/LaunchDaemons/com.mackeeper.AdwareAnalyzer.AdwareAnalyzerPrivilegedHelper.plist
Uninstall MacKeeper
allCompletely remove MacKeeper from the system
Use MacKeeper's built-in uninstaller or manually remove all components
🧯 If You Can't Patch
- Remove MacKeeper entirely from affected systems
- Implement strict application control to prevent unauthorized applications from running
🔍 How to Verify
Check if Vulnerable:
Check if com.mackeeper.AdwareAnalyzer.AdwareAnalyzerPrivilegedHelper exists: ls -la /Library/PrivilegedHelperTools/
Check Version:
Check MacKeeper About section or look for version in application bundle
Verify Fix Applied:
Verify the helper tool is removed or MacKeeper version is >3.20.4
📡 Detection & Monitoring
Log Indicators:
- Unusual root privilege escalation attempts
- Execution of shell commands via XPC service
- Processes running as root from user applications
Network Indicators:
- None - this is a local privilege escalation
SIEM Query:
Process creation where parent process is XPC service and user transitions from non-root to root