CVE-2024-46062

7.8 HIGH

📋 TL;DR

This vulnerability allows local privilege escalation on macOS systems running vulnerable Miniconda3 installers. When installed outside the user's home directory, world-writable files are created and executed with root privileges, enabling local low-privileged users to inject arbitrary commands and gain root access. This affects macOS users who installed Miniconda3 in system directories or other non-home locations.

💻 Affected Systems

Products:
  • Miniconda3
Versions: All versions before 23.11.0-1
Operating Systems: macOS
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when installed outside the user's home directory (e.g., in /opt, /usr/local, or other system directories). Default home directory installations are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains full root privileges on the macOS system, enabling complete system compromise, data theft, persistence mechanisms, and lateral movement.

🟠

Likely Case

Local user or malware with limited privileges escalates to root to install additional malware, modify system configurations, or access sensitive data.

🟢

If Mitigated

Attack is prevented by proper installation practices or patching, limiting impact to normal user-level operations.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring local access to the system.
🏢 Internal Only: HIGH - Any compromised user account or malware with local access can exploit this to gain root privileges.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access but is straightforward once access is obtained. The vulnerability is well-documented with technical details available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 23.11.0-1 and later

Vendor Advisory: https://www.anaconda.com/docs/getting-started/miniconda/release/23.x#miniconda-23-11-0-1

Restart Required: No

Instructions:

1. Download Miniconda3 version 23.11.0-1 or later from the official Anaconda website. 2. Uninstall the vulnerable version. 3. Install the patched version, preferably in your home directory. 4. Verify the installation is not in a system directory.

🔧 Temporary Workarounds

Reinstall in Home Directory

macOS

Move Miniconda3 installation to the user's home directory where the vulnerability does not apply.

conda deactivate
rm -rf /path/to/vulnerable/miniconda3
curl -O https://repo.anaconda.com/miniconda/Miniconda3-latest-MacOSX-x86_64.sh
bash Miniconda3-latest-MacOSX-x86_64.sh -b -p $HOME/miniconda3

Remove World-Writable Permissions

macOS

Manually fix permissions on Miniconda3 installation directories to prevent exploitation.

sudo chmod -R o-w /path/to/miniconda3

🧯 If You Can't Patch

  • Restrict local user access to systems with vulnerable installations
  • Monitor for suspicious root privilege escalation attempts and file modifications in Miniconda directories

🔍 How to Verify

Check if Vulnerable:

Check if Miniconda3 is installed outside home directory and version is below 23.11.0-1: run 'conda --version' and check installation path.

Check Version:

conda --version

Verify Fix Applied:

Verify Miniconda3 version is 23.11.0-1 or higher with 'conda --version' and confirm installation is in home directory.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected root privilege escalation events
  • File permission changes in Miniconda directories
  • Execution of scripts from world-writable directories with root privileges

Network Indicators:

  • None - this is a local attack

SIEM Query:

process where parent_process_name contains "installer" and process_name contains "sh" or "bash" and process_path contains "miniconda" and user contains "root"

🔗 References

📤 Share & Export