CVE-2024-46060

7.8 HIGH

📋 TL;DR

This CVE describes a local privilege escalation vulnerability in Anaconda3 macOS installers. When installed outside the user's home directory, world-writable files are created and executed with root privileges, allowing local low-privileged users to inject arbitrary commands and gain root access. This affects macOS users who installed Anaconda3 outside their home directory.

💻 Affected Systems

Products:
  • Anaconda3
Versions: All versions before 2024.06-1
Operating Systems: macOS
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when installed outside the user's home directory. Default installations in home directory are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains full root privileges on the macOS system, enabling complete system compromise, data theft, persistence mechanisms, and lateral movement.

🟠

Likely Case

Malicious local user or malware with user-level access escalates to root to install backdoors, steal sensitive data, or disable security controls.

🟢

If Mitigated

With proper access controls and monitoring, exploitation would be detected and contained before significant damage occurs.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring local access to the system.
🏢 Internal Only: HIGH - Any compromised user account or malware with local access could exploit this to gain root privileges.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access but is straightforward once access is obtained. Public technical details available in referenced blog post.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024.06-1 and later

Vendor Advisory: https://www.anaconda.com/docs/getting-started/anaconda/release/2024.x#anaconda-2024-06-1

Restart Required: No

Instructions:

1. Update Anaconda3 to version 2024.06-1 or later using 'conda update anaconda' 2. Alternatively, reinstall Anaconda3 using the latest installer from anaconda.com

🔧 Temporary Workarounds

Move installation to home directory

macos

Reinstall Anaconda3 in the user's home directory where the vulnerability does not exist

# Uninstall current Anaconda3
# Download latest installer
# Install to ~/anaconda3 or similar home directory location

Restrict file permissions

macos

Manually remove world-writable permissions from Anaconda installation files

sudo chmod -R o-w /path/to/anaconda3

🧯 If You Can't Patch

  • Monitor for suspicious privilege escalation attempts and file permission changes in Anaconda directories
  • Implement strict access controls to limit local user access to systems with vulnerable installations

🔍 How to Verify

Check if Vulnerable:

Check Anaconda version with 'conda --version' and verify installation location is outside home directory

Check Version:

conda --version

Verify Fix Applied:

Confirm version is 2024.06-1 or later with 'conda --version' and check file permissions in installation directory

📡 Detection & Monitoring

Log Indicators:

  • Unexpected privilege escalation events
  • File permission changes in Anaconda directories
  • Execution of scripts from world-writable locations

Network Indicators:

  • None - this is a local vulnerability

SIEM Query:

source="macos" (event_type="privilege_escalation" OR file_permission_change) AND path="*/anaconda3/*"

🔗 References

📤 Share & Export