macOS Sequoia 15.2 includes fix for a System Integrity Protection vulnerability
www.macworld.com
MacworldMicrosoft has released details on a security vulnerability that was fixed with the macOS Sequia 15.2 update, which was released in December. The flaw could have been exploited by an attacker to bypass macOSs System Integrity Protection (SIP), which stops unauthorized code from running.Documented as CVE-2024-44243, the vulnerability involved macOSs Storage Kit daemon and its entitlements. According to Microsoft, Storage Kit has many SIP bypassing capabilities that a hacker can exploit. The Sequoia 15.2 update security notes state that a configuration issue was the root of the flaw:StorageKitAvailable for: macOS SequoiaImpact: An app may be able to modify protected parts of the file systemDescription: A configuration issue was addressed with additional restrictions.CVE-2024-44243: Mickey Jin (@patch1t), Jonathan Bar Or (@yo_yo_yo_jbo) of MicrosoftSIP became part of macOS over nine years ago, with the release of OS X El Capitan. When SIP is running, it is often said that the Mac is in rootless mode and a majority of users can use SIP without it ever being an issuechances are, you dont even know youre running SIP. A few users do require root access to their Macs, and SIP can be turned off.How to protect yourself from malwareApple releases security patches through OS updates, so installing them as soon as possible is important. And as always, when downloading software, get it from trusted sources, such as the App Store (which makes security checks of its software) or directly from the developer. Macworld has several guides to help, including a guide onwhether or not you need antivirus software, alist of Mac viruses, malware, and trojans, and acomparison of Mac security software
0 Comentários ·0 Compartilhamentos ·53 Visualizações