CVE-2024-23746

9.8 CRITICAL

📋 TL;DR

CVE-2024-23746 is a local privilege escalation vulnerability in Miro Desktop for macOS that allows attackers to inject malicious code into the Electron application. This enables arbitrary code execution with the privileges of the Miro application, potentially leading to full system compromise. Only macOS users running Miro Desktop version 0.8.18 are affected.

💻 Affected Systems

Products:
  • Miro Desktop
Versions: 0.8.18
Operating Systems: macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects macOS due to specific TCC bypass requirements. Requires local access to the target system.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise via privilege escalation to root, allowing installation of persistent malware, data theft, and complete control of the affected system.

🟠

Likely Case

Local attacker gains ability to execute arbitrary code with user privileges, potentially accessing sensitive data within Miro and other user-accessible resources.

🟢

If Mitigated

With proper application sandboxing and file permission controls, impact limited to Miro application data only.

🌐 Internet-Facing: LOW - This is a local attack requiring physical or remote desktop access to the target system.
🏢 Internal Only: HIGH - Malicious insiders or compromised user accounts can exploit this to escalate privileges and move laterally within the network.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploit requires local access and involves multiple file manipulation steps including app bundle modification and ASAR archive manipulation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Later than 0.8.18

Vendor Advisory: https://miro.com/about/

Restart Required: Yes

Instructions:

1. Open Miro Desktop application. 2. Go to Settings > About. 3. Check for updates and install latest version. 4. Restart the application.

🔧 Temporary Workarounds

Remove vulnerable version

macos

Uninstall Miro Desktop 0.8.18 completely from the system

sudo rm -rf /Applications/Miro.app
rm -rf ~/Library/Application\ Support/Miro

Restrict application permissions

macos

Use macOS Privacy controls to restrict Miro's file access permissions

🧯 If You Can't Patch

  • Implement strict file permission controls on Miro application directories
  • Monitor for suspicious file modifications in /Applications/Miro.app/Contents/

🔍 How to Verify

Check if Vulnerable:

Check Miro Desktop version: Open Miro, go to Settings > About, verify version is 0.8.18

Check Version:

defaults read /Applications/Miro.app/Contents/Info.plist CFBundleShortVersionString

Verify Fix Applied:

After update, verify version is newer than 0.8.18 in Settings > About

📡 Detection & Monitoring

Log Indicators:

  • File modification events in /Applications/Miro.app/Contents/
  • Process execution from modified Miro application bundle

Network Indicators:

  • Unusual outbound connections from Miro process

SIEM Query:

source="macos" AND (event_type="file_modification" AND file_path="/Applications/Miro.app/Contents/*") OR (process_name="Miro" AND parent_process!="launchd")

🔗 References

📤 Share & Export