CVE-2021-3187
📋 TL;DR
This vulnerability allows authenticated, unprivileged users on macOS systems to elevate their privileges to root during software installation. It affects BeyondTrust Privilege Management for Mac versions before 5.7 on macOS versions before 10.15.5, or Security Update 2020-003 on Mojave and High Sierra.
💻 Affected Systems
- BeyondTrust Privilege Management for Mac
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
An authenticated attacker gains full root access to the macOS system, enabling complete system compromise, data theft, and persistent backdoor installation.
Likely Case
Malicious insider or compromised user account escalates privileges to install malware, access sensitive data, or bypass security controls.
If Mitigated
Limited impact due to proper access controls, monitoring, and timely patching preventing successful exploitation.
🎯 Exploit Status
Exploitation requires authenticated user access and occurs during software installation time.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 5.7 or later
Vendor Advisory: https://www.beyondtrust.com/trust-center/security-advisories/bt22-06
Restart Required: Yes
Instructions:
1. Update BeyondTrust Privilege Management for Mac to version 5.7 or later. 2. Ensure macOS is updated to 10.15.5+ or has Security Update 2020-003 applied. 3. Restart affected systems.
🔧 Temporary Workarounds
Update macOS
macosUpdate macOS to version 10.15.5 or later, which is not vulnerable regardless of BeyondTrust version.
sudo softwareupdate --install --all
Apply Security Update
macosApply Security Update 2020-003 on macOS Mojave or High Sierra systems.
sudo softwareupdate --install "Security Update 2020-003"
🧯 If You Can't Patch
- Restrict user access to systems running vulnerable versions to trusted personnel only.
- Implement strict monitoring of installation activities and temporary directory access.
🔍 How to Verify
Check if Vulnerable:
Check BeyondTrust version with 'sudo /usr/local/bin/bpriv' or similar command, and macOS version with 'sw_vers'.
Check Version:
sudo /usr/local/bin/bpriv --version && sw_vers
Verify Fix Applied:
Verify BeyondTrust version is 5.7+ and macOS is 10.15.5+ or has Security Update 2020-003 applied.
📡 Detection & Monitoring
Log Indicators:
- Unusual root-level process execution during software installation
- Script execution from temporary directories with elevated privileges
Network Indicators:
- None - local privilege escalation only
SIEM Query:
Process execution events where parent process is installation-related and child process runs as root from /tmp or similar temporary directories.