CVE-2025-29800

7.8 HIGH

📋 TL;DR

CVE-2025-29800 is a local privilege escalation vulnerability in Microsoft AutoUpdate (MAU) that allows authenticated attackers to gain elevated system privileges. This affects macOS systems running vulnerable versions of MAU. Attackers must already have local user access to exploit this vulnerability.

💻 Affected Systems

Products:
  • Microsoft AutoUpdate (MAU)
Versions: Versions prior to the patched version (specific version numbers not yet published in advisory)
Operating Systems: macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects macOS systems with Microsoft AutoUpdate installed. Microsoft Office for Mac and other Microsoft products that use MAU for updates are likely affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with standard user privileges could gain root/system-level access, enabling complete system compromise, data theft, malware persistence, and lateral movement across the network.

🟠

Likely Case

Malicious insiders or attackers who have already compromised a user account could elevate privileges to install persistent malware, disable security controls, or access sensitive data.

🟢

If Mitigated

With proper privilege separation and endpoint protection, the impact is limited to the compromised user account without system-wide compromise.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring existing local access, not directly exploitable over the internet.
🏢 Internal Only: HIGH - Once an attacker gains initial access to a system (via phishing, credential theft, etc.), they can exploit this to gain full control of the device.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires local authenticated access. The CWE-269 (Improper Privilege Management) suggests the vulnerability involves improper privilege handling that could be exploited through standard user actions.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Specific version not yet published in advisory - check Microsoft Security Response Center for latest

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29800

Restart Required: Yes

Instructions:

1. Open Microsoft AutoUpdate on macOS. 2. Check for updates. 3. Install available updates. 4. Restart the system if prompted. Alternatively, update through Microsoft 365 apps or download from Microsoft's official site.

🔧 Temporary Workarounds

Disable Microsoft AutoUpdate

macOS

Temporarily disable MAU to prevent exploitation while awaiting patch deployment

sudo launchctl unload /Library/LaunchDaemons/com.microsoft.autoupdate.helper.plist
sudo launchctl unload /Library/LaunchAgents/com.microsoft.update.agent.plist

Restrict MAU Execution

macOS

Use macOS privacy controls to restrict MAU execution or network access

🧯 If You Can't Patch

  • Implement strict privilege separation - ensure users operate with minimal necessary privileges
  • Deploy endpoint detection and response (EDR) solutions to monitor for privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check MAU version: Open Microsoft AutoUpdate → About Microsoft AutoUpdate. Compare version against patched version in Microsoft advisory.

Check Version:

defaults read /Library/Preferences/com.microsoft.autoupdate2.plist Version

Verify Fix Applied:

Verify MAU is updated to patched version and check system logs for any privilege escalation attempts post-update.

📡 Detection & Monitoring

Log Indicators:

  • Unusual privilege escalation events in system logs
  • MAU process spawning with elevated privileges unexpectedly
  • Authentication logs showing user privilege changes

Network Indicators:

  • MAU communicating with unusual endpoints or at unusual times

SIEM Query:

Process creation where parent_process contains 'Microsoft AutoUpdate' and (process_name contains 'sudo' OR process_name contains 'launchctl' OR integrity_level changed)

🔗 References

📤 Share & Export