CVE-2025-24036

7.0 HIGH

📋 TL;DR

This vulnerability in Microsoft AutoUpdate (MAU) allows attackers to gain elevated privileges on affected systems. It affects macOS devices running Microsoft AutoUpdate, potentially enabling local attackers to execute arbitrary code with higher privileges than intended. The vulnerability requires local access to exploit.

💻 Affected Systems

Products:
  • Microsoft AutoUpdate (MAU)
Versions: Versions prior to the patched version
Operating Systems: macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects macOS systems with Microsoft AutoUpdate installed. This typically includes systems with Microsoft Office for Mac or other Microsoft applications.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with local access could gain root privileges, install persistent malware, access sensitive system files, and completely compromise the macOS system.

🟠

Likely Case

Local attackers could escalate privileges to install additional malicious software, modify system configurations, or access protected user data.

🟢

If Mitigated

With proper access controls and least privilege principles, the impact is limited to the local user context with minimal lateral movement potential.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability that requires local access to the system; it cannot be exploited remotely over the internet.
🏢 Internal Only: MEDIUM - Internal attackers with local access could exploit this to gain elevated privileges, but it requires initial access to the system.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access to the system. The CWE-367 classification indicates a time-of-check time-of-use (TOCTOU) race condition vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Microsoft AutoUpdate for latest version via the application or Microsoft's security update

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24036

Restart Required: No

Instructions:

1. Open Microsoft AutoUpdate application. 2. Check for updates. 3. Install available updates. 4. Alternatively, update through Microsoft 365 apps or download from Microsoft's website.

🔧 Temporary Workarounds

Disable Microsoft AutoUpdate

macOS

Temporarily disable Microsoft AutoUpdate to prevent exploitation while awaiting patch deployment

sudo launchctl unload /Library/LaunchDaemons/com.microsoft.autoupdate.helper.plist
sudo rm /Library/PrivilegedHelperTools/com.microsoft.autoupdate.helper

🧯 If You Can't Patch

  • Implement strict access controls to limit local user privileges
  • Monitor for suspicious privilege escalation attempts and unauthorized process execution

🔍 How to Verify

Check if Vulnerable:

Check Microsoft AutoUpdate version in the application or via terminal: ls -la /Library/Application\ Support/Microsoft/MAU2.0/

Check Version:

defaults read /Library/Application\ Support/Microsoft/MAU2.0/Microsoft\ AutoUpdate.app/Contents/Info.plist CFBundleVersion

Verify Fix Applied:

Verify Microsoft AutoUpdate has been updated to the latest version and check that the helper tool has been updated

📡 Detection & Monitoring

Log Indicators:

  • Unusual privilege escalation attempts
  • Suspicious Microsoft AutoUpdate process behavior
  • Unauthorized modifications to system files

Network Indicators:

  • Unusual outbound connections from Microsoft AutoUpdate processes

SIEM Query:

process_name:"Microsoft AutoUpdate" AND (event_type:"privilege_escalation" OR parent_process:"sudo")

🔗 References

📤 Share & Export