CVE-2023-24930

7.8 HIGH

📋 TL;DR

This vulnerability in Microsoft OneDrive for macOS allows an attacker to gain elevated privileges on the system. An authenticated attacker could exploit this to execute arbitrary code with higher permissions than intended. Only macOS users running vulnerable versions of OneDrive are affected.

💻 Affected Systems

Products:
  • Microsoft OneDrive
Versions: Versions prior to 23.080.0421.0002
Operating Systems: macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects macOS versions of OneDrive. Requires attacker to have initial access to the system.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker gains full system control, installs persistent malware, accesses sensitive data, and compromises other user accounts on the same machine.

🟠

Likely Case

Local privilege escalation allowing attackers to bypass security controls, install additional malicious software, or access protected system resources.

🟢

If Mitigated

Limited impact with proper endpoint protection, least privilege principles, and network segmentation in place.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring local access or user interaction.
🏢 Internal Only: MEDIUM - Internal attackers or malware with initial foothold could exploit this to escalate privileges on compromised macOS workstations.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and some level of user interaction or existing foothold. No public exploit code available as of knowledge cutoff.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 23.080.0421.0002 and later

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24930

Restart Required: Yes

Instructions:

1. Open OneDrive on macOS. 2. Click the OneDrive cloud icon in the menu bar. 3. Select Help & Settings > Preferences. 4. Go to the About tab. 5. Check version and update if below 23.080.0421.0002. 6. Restart the application or system if prompted.

🔧 Temporary Workarounds

Disable OneDrive Auto-Start

all

Prevent OneDrive from automatically starting with the system to reduce attack surface

launchctl unload -w ~/Library/LaunchAgents/com.microsoft.OneDriveUpdater.plist
rm ~/Library/LaunchAgents/com.microsoft.OneDriveUpdater.plist

Restrict OneDrive Permissions

all

Limit OneDrive's access using macOS Privacy & Security settings

🧯 If You Can't Patch

  • Implement strict endpoint detection and response (EDR) to monitor for privilege escalation attempts
  • Apply principle of least privilege to user accounts and restrict administrative access

🔍 How to Verify

Check if Vulnerable:

Check OneDrive version in Preferences > About tab. If version is below 23.080.0421.0002, system is vulnerable.

Check Version:

defaults read /Applications/OneDrive.app/Contents/Info.plist CFBundleShortVersionString

Verify Fix Applied:

Confirm version is 23.080.0421.0002 or higher in Preferences > About tab after update.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process spawning from OneDrive
  • Privilege escalation attempts in system logs
  • Unauthorized access to protected directories

Network Indicators:

  • Unusual outbound connections from OneDrive process

SIEM Query:

process_name:"OneDrive" AND (event_type:"privilege_escalation" OR parent_process:"OneDrive" AND process_integrity_level:"high")

🔗 References

📤 Share & Export