CVE-2023-41902

7.8 HIGH

📋 TL;DR

This vulnerability allows attackers to escalate privileges on macOS systems by exploiting an XPC misconfiguration in CoreCode MacUpdater. Attackers can craft malicious .pkg files that, when processed by vulnerable versions, enable unauthorized privilege escalation. This affects users running MacUpdater versions before 2.3.8 or 3.x before 3.1.2.

💻 Affected Systems

Products:
  • CoreCode MacUpdater
Versions: Versions before 2.3.8 and 3.x before 3.1.2
Operating Systems: macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. Requires macOS as the underlying operating system.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with root privileges, allowing installation of persistent malware, data theft, and complete system control.

🟠

Likely Case

Local privilege escalation to root, enabling installation of additional malicious software and bypassing macOS security controls.

🟢

If Mitigated

No impact if patched versions are used or if malicious .pkg files are prevented from reaching the system.

🌐 Internet-Facing: LOW - This is primarily a local privilege escalation vulnerability requiring user interaction with malicious files.
🏢 Internal Only: MEDIUM - Internal users could exploit this if they can deliver malicious .pkg files to target systems, but requires local access or social engineering.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires user interaction to open a malicious .pkg file. Public proof-of-concept exists in the referenced GitHub gist.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.3.8 for version 2.x, 3.1.2 for version 3.x

Vendor Advisory: https://www.corecode.io/macupdater/history2.html and https://www.corecode.io/macupdater/history3.html

Restart Required: No

Instructions:

1. Open MacUpdater. 2. Go to 'Check for Updates' in the menu. 3. Install the available update to version 2.3.8 or 3.1.2. 4. Alternatively, download the latest version from the official website and install it.

🔧 Temporary Workarounds

Disable automatic .pkg processing

macos

Configure macOS to not automatically open .pkg files and require manual verification

Restrict .pkg file sources

macos

Only allow .pkg files from trusted sources and implement application whitelisting

🧯 If You Can't Patch

  • Uninstall MacUpdater if not essential for operations
  • Implement strict controls on .pkg file execution and educate users about the risks of opening untrusted packages

🔍 How to Verify

Check if Vulnerable:

Check MacUpdater version in the application's 'About' menu or by running: /Applications/MacUpdater.app/Contents/MacOS/MacUpdater --version

Check Version:

/Applications/MacUpdater.app/Contents/MacOS/MacUpdater --version

Verify Fix Applied:

Verify version is 2.3.8 or higher for version 2.x, or 3.1.2 or higher for version 3.x

📡 Detection & Monitoring

Log Indicators:

  • Unusual privilege escalation events in macOS system logs
  • MacUpdater process spawning with elevated privileges unexpectedly

Network Indicators:

  • Downloads of suspicious .pkg files from untrusted sources

SIEM Query:

process_name:"MacUpdater" AND parent_process_name:"launchd" AND process_integrity_level:"System"

🔗 References

📤 Share & Export