Security

Apple fixed macOS flaw that could allow to bypass Gatekeeper security feature

Apple recently addressed fixed a flaw in the macOS that could be potentially exploited by an attacker to bypass Gatekeeper security feature.

Apple recently addressed a vulnerability in the macOS operating system, tracked as CVE-2021-30853, that could be potentially exploited by an attacker to bypass the Gatekeeper security feature and run arbitrary code. The vulnerability was reported to Apple by Gordon Long of Box and addressed the flaw with the release of macOS 11.6 updates on September 20, 2021. According to the security advisory published by Apple, this issue was addressed with improved checks.

“A malicious application may bypass Gatekeeper checks.” reads the advisory. “This issue was addressed with improved checks.

A malicious code could bypass automated notarization security checks, which scan for malicious components in the applications, and could be launched by Gatekeeper.

The popular white-hat hacker Patrick Wardle, analyzed the vulnerability and explained why it is so dangerous.

Wardle pointed out that the bug is very intriguing, its exploitation could allow bypassing also File Quarantine, and macOS’s recent notarization requirements.

The experts explained that an attacker can trigger the flaw by tricking the victims into opening a malicious application masqueraded as a harmless PDF, that could be sent to them via email.

Wardle explained that the root cause is that an unsigned, non-notarized script-based application can not explicitly specify an interpreter.

“The astute reader may have noticed that though the script started with the familiar #! (“Shebang”), it is missing an interpreter such as /bin/bash. However when launched, macOS seems to handle this without issue, and still executed the script.” reads post published by Wardle. “Though the process monitor output confirms that macOS will execute the “interpreter-less” script via bash, that fact that no interpreter was specified is ultimately what triggers a (rather nuanced) bug in the kernel. A bug, that allows the PoC to execute without being subjected to File Quarantine, Gatekeeper, nor notarization checks!”

shebang (#!) interpreter directive (e.g. #!/bin/sh or #!/bin/bash) is used to parse and interpret a shell. A malicious application used to exploit this issue can incorporate the shebang line missing an interpreter (i.e., #!) to get the underlying operating system to attempt to execute the script without raising any alert.

“The syspolicyd daemon will perform various policy checks and ultimately prevent the execution of untrusted applications, such as those that are unsigned or unnotarized,” continues the researcher. “But, what if the AppleSystemPolicy kext decides that the syspolicyd daemon does not need to be invoked? Well then, the process is allowed! And if this decision is made incorrectly, well then, you have a lovely File Quarantine, Gatekeeper, and notarization bypass.”

This is not the first issue in macOS that was discovered by researchers and that would enable attackers to bypass the security features implemented by the Apple operating system.

In April, Apple fixed a zero-day vulnerability, tracked as CVE-2021-30657, exploited by Shlayer malware to bypass Apple’s security features and deliver second-stage malicious payloads.

In October, Microsoft discovered a vulnerability in macOS, dubbed Shrootless (CVE-2021-30892), that can allow attackers to bypass System Integrity Protection (SIP) and perform malicious activities, such as gaining root privileges and installing rootkits on vulnerable devices.

Follow me on Twitter: @securityaffairs and Facebook

[adrotate banner=”9″][adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – hacking, Gatekeeper)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Fintech firm Figure disclosed data breach after employee phishing attack

Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…

16 hours ago

U.S. CISA adds a flaw in BeyondTrust RS and PRA to its Known Exploited Vulnerabilities catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…

17 hours ago

Suspected Russian hackers deploy CANFAIL malware against Ukraine

A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…

22 hours ago

New threat actor UAT-9921 deploys VoidLink against enterprise sectors

A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…

1 day ago

Attackers exploit BeyondTrust CVE-2026-1731 within hours of PoC release

Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…

2 days ago

Google: state-backed hackers exploit Gemini AI for cyber recon and attacks

Google says nation-state actors used Gemini AI for reconnaissance and attack support in cyber operations.…

2 days ago

This website uses cookies.