CVE-2024-44141
📋 TL;DR
This vulnerability allows an attacker with physical access to an unlocked Mac to execute arbitrary code with root privileges. It affects macOS systems before Sonoma 14.6. The risk is primarily to organizations with shared or publicly accessible Mac computers.
💻 Affected Systems
- macOS
📦 What is this software?
Macos by Apple
macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...
Learn more about Macos →⚠️ Risk & Real-World Impact
Worst Case
Full system compromise with root-level persistence, data theft, and installation of backdoors or malware.
Likely Case
Local privilege escalation leading to unauthorized access to sensitive files and system configuration changes.
If Mitigated
Limited impact if physical access controls prevent unauthorized users from accessing unlocked systems.
🎯 Exploit Status
Exploitation requires physical access to an unlocked system, making it straightforward for an attacker with that access.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: macOS Sonoma 14.6
Vendor Advisory: https://support.apple.com/en-us/120911
Restart Required: Yes
Instructions:
1. Open System Settings. 2. Go to General > Software Update. 3. Install macOS Sonoma 14.6 update. 4. Restart the computer when prompted.
🔧 Temporary Workarounds
Enable automatic screen lock
allConfigure macOS to lock automatically after inactivity to prevent physical access to unlocked systems.
sudo defaults write /Library/Preferences/com.apple.screensaver askForPassword -int 1
sudo defaults write /Library/Preferences/com.apple.screensaver askForPasswordDelay -int 0
Require password immediately after sleep or screen saver
allSet immediate password requirement when waking from sleep or screen saver.
sudo defaults write /Library/Preferences/com.apple.screensaver askForPasswordDelay -int 0
🧯 If You Can't Patch
- Implement strict physical access controls to prevent unauthorized users from accessing Mac computers.
- Enforce policies requiring users to lock screens when away from their workstations.
🔍 How to Verify
Check if Vulnerable:
Check macOS version: if running macOS Sonoma earlier than 14.6, the system is vulnerable.
Check Version:
sw_vers
Verify Fix Applied:
Verify macOS version is 14.6 or later after applying the update.
📡 Detection & Monitoring
Log Indicators:
- Unexpected root privilege escalations in system logs
- Unauthorized user account activity
Network Indicators:
- Unusual outbound connections from affected systems
SIEM Query:
source="macos_system_logs" AND (event="privilege_escalation" OR user="root")