CVE-2023-42844
📋 TL;DR
This macOS vulnerability allows websites to access sensitive user data through improper symlink resolution. It affects macOS Monterey, Ventura, and Sonoma users who visit malicious websites. The issue enables unauthorized data access when resolving symbolic links.
💻 Affected Systems
- macOS
📦 What is this software?
Macos by Apple
macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...
Learn more about Macos →Macos by Apple
macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...
Learn more about Macos →Macos by Apple
macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...
Learn more about Macos →⚠️ Risk & Real-World Impact
Worst Case
Malicious website could access sensitive files including passwords, documents, and system files through symlink traversal, potentially leading to data theft or credential compromise.
Likely Case
Targeted attacks where users visit crafted websites that exploit symlink resolution to access specific sensitive files in predictable locations.
If Mitigated
With proper web browser sandboxing and file system permissions, impact is limited to files accessible to the user's current session and browser context.
🎯 Exploit Status
Exploitation requires user to visit malicious website but no authentication needed. Public disclosures include technical details.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: macOS Sonoma 14.1, macOS Monterey 12.7.1, macOS Ventura 13.6.1
Vendor Advisory: https://support.apple.com/en-us/HT213983
Restart Required: Yes
Instructions:
1. Open System Settings > General > Software Update. 2. Install available updates. 3. Restart when prompted.
🔧 Temporary Workarounds
Disable automatic symlink resolution in browser
allConfigure web browsers to restrict symlink resolution or use browser extensions that block symlink-based attacks
Use browser sandboxing
allEnsure browsers run with strict sandboxing enabled to limit file system access
🧯 If You Can't Patch
- Restrict web browsing to trusted sites only using browser extensions or network filtering
- Implement application whitelisting to prevent unauthorized browser execution
🔍 How to Verify
Check if Vulnerable:
Check macOS version in System Settings > General > About. If version is Monterey 12.0-12.7, Ventura 13.0-13.6, or Sonoma 14.0-14.0, system is vulnerable.
Check Version:
sw_vers
Verify Fix Applied:
Verify macOS version is Monterey 12.7.1 or later, Ventura 13.6.1 or later, or Sonoma 14.1 or later.
📡 Detection & Monitoring
Log Indicators:
- Unusual file access patterns from browser processes
- Symlink creation in user-accessible directories
Network Indicators:
- Connections to known malicious domains serving exploit code
- Unusual outbound data transfers from browser processes
SIEM Query:
process_name:"Safari" OR process_name:"Chrome" AND file_access:"*symlink*" OR file_access:"*ln -s*"
🔗 References
- http://seclists.org/fulldisclosure/2023/Oct/21
- http://seclists.org/fulldisclosure/2023/Oct/24
- http://seclists.org/fulldisclosure/2023/Oct/26
- https://support.apple.com/en-us/HT213983
- https://support.apple.com/en-us/HT213984
- https://support.apple.com/en-us/HT213985
- https://support.apple.com/kb/HT213983
- https://support.apple.com/kb/HT213984
- https://support.apple.com/kb/HT213985
- http://seclists.org/fulldisclosure/2023/Oct/21
- http://seclists.org/fulldisclosure/2023/Oct/24
- http://seclists.org/fulldisclosure/2023/Oct/26
- https://support.apple.com/en-us/HT213983
- https://support.apple.com/en-us/HT213984
- https://support.apple.com/en-us/HT213985
- https://support.apple.com/kb/HT213983
- https://support.apple.com/kb/HT213984
- https://support.apple.com/kb/HT213985