A significant security flaw has been uncovered in several popular Microsoft applications for macOS, raising alarms about user privacy and data security. The vulnerability, discovered by Cisco Talos security researchers, affects widely used apps including Outlook, Teams, Word, Excel, PowerPoint, and OneNote. If exploited, this flaw could allow hackers to bypass macOS’s Transparency, Consent, and Control (TCC) framework, enabling unauthorized access to sensitive data such as camera feeds and microphone recordings.
The TCC framework is designed to manage app permissions for accessing critical features like the camera, microphone, and files. However, the researchers found that by injecting malicious libraries into Microsoft apps, attackers could exploit the permissions already granted to these applications without requiring additional user consent. This would give them the ability to spy on users, steal sensitive data, and potentially escalate their control over the entire system. The issue lies in how Microsoft apps handle library entitlements, making it possible for malicious software to leverage existing permissions for nefarious purposes.
Although Microsoft has released updates for Teams and OneNote to address the vulnerability, other apps such as Excel, PowerPoint, Word, and Outlook remain at risk. Microsoft has classified the exploit as “low risk” due to its reliance on loading unsigned libraries for third-party plugins. Nonetheless, the potential consequences of this vulnerability are severe, including unauthorized access to a user’s camera and microphone, theft of sensitive data, and disruption of system functionality.
To mitigate the risk, macOS users are advised to regularly update their Microsoft apps, review and disable unnecessary permissions, and stay informed about further security patches. The incident has also sparked discussions about the need for more secure handling of third-party plugins in macOS, with suggestions ranging from stricter notarization requirements to more user-controlled prompts for plugin permissions. Until a comprehensive fix is released, users must remain vigilant to protect their privacy and data from potential exploitation.
Reference: