CVE-2024-41145

7.1 HIGH

📋 TL;DR

A library injection vulnerability in Microsoft Teams for macOS allows malicious applications to inject code into the WebView.app helper process. This enables privilege escalation by leveraging Teams's access permissions. Only macOS users running the specific vulnerable version of Microsoft Teams (work or school) are affected.

💻 Affected Systems

Products:
  • Microsoft Teams (work or school)
Versions: 24046.2813.2770.1094
Operating Systems: macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the macOS version of Microsoft Teams for work/school accounts. Personal/consumer Teams versions may not be affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through privilege escalation, allowing attackers to access sensitive data, install persistent malware, or pivot to other systems.

🟠

Likely Case

Local privilege escalation enabling unauthorized access to Teams data, system resources, or user files that Teams can access.

🟢

If Mitigated

Limited impact with proper application sandboxing and security controls preventing malicious application execution.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring a malicious application to already be running on the system.
🏢 Internal Only: MEDIUM - Internal attackers with local access could exploit this to escalate privileges and access sensitive Teams data.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires a malicious application to be installed and executed on the target system first. The vulnerability is in the library loading mechanism of the WebView.app helper.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Microsoft Teams auto-update or version > 24046.2813.2770.1094

Vendor Advisory: https://talosintelligence.com/vulnerability_reports/TALOS-2024-1990

Restart Required: Yes

Instructions:

1. Open Microsoft Teams. 2. Click on your profile picture. 3. Select 'Check for updates'. 4. Install any available updates. 5. Restart Teams completely.

🔧 Temporary Workarounds

Disable automatic library loading

macOS

Configure macOS to restrict library loading from untrusted locations

sudo spctl --master-enable
sudo spctl --enable --label "Developer ID"

Restrict Teams permissions

macOS

Reduce Teams's system permissions through macOS Privacy settings

🧯 If You Can't Patch

  • Restrict user privileges to prevent installation of unauthorized applications
  • Implement application allowlisting to control which applications can run on macOS systems

🔍 How to Verify

Check if Vulnerable:

Check Teams version: Open Teams → Click profile picture → About → Check if version is 24046.2813.2770.1094

Check Version:

defaults read /Applications/Microsoft\ Teams.app/Contents/Info.plist CFBundleShortVersionString

Verify Fix Applied:

Verify Teams version is updated beyond 24046.2813.2770.1094 and check for recent update history

📡 Detection & Monitoring

Log Indicators:

  • Unusual library loading in Teams process
  • Suspicious child processes spawned from Teams
  • Teams accessing unexpected system resources

Network Indicators:

  • Teams making unexpected network connections after library injection

SIEM Query:

process_name:"Microsoft Teams" AND (event_type:"library_load" OR parent_process:"WebView.app")

🔗 References

📤 Share & Export