Nasty macOS bug could have let hackers dance past security protections

A representative image of someone hacking online.
(Image credit: 123RF)

Cybersecurity researchers have discovered a new vulnerability in macOS which allowed threat actors to completely bypass native security solutions and execute an unsigned and unnotarized application without displaying security prompts.

Announcing the news in a blog post, researchers from Jamf Threat Labs said they spotted the flaw in the macOS Archive Utility, the native macOS archiving application, similar to WinRAR and other archiving apps. 

Abusing the flaw found in this app allows threat actors to circumvent Gatekeeper, and all other security checks.

Quarantining folders

Explaining the flaw, tracked as CVE-2022-32910, Jamf said it revolves around how macOS handles unarchiving files downloaded from the internet. 

When a Mac user downloads an archive, it will receive an extended attribute title com.apple.quarantine, signaling to the OS that it was received from a remote location and should be analyzed. Everything that gets extracted will also receive the same quarantine attribute. Well - almost everything. In some cases, Archive Utility will create additional folders to avoid confusion:

“When it comes to application bundles — Gatekeeper only cares if the app directory itself has a quarantine attribute set and disregards recursive files within the app bundle. Therefore, we can bypass Gatekeeper by ensuring that our non-quarantined folder is an application,” the researchers explained. 

“As mentioned, the folder name containing our unarchived files is controlled by the user because Archive Utility creates this folder based on the archive name without the extension. Therefore, we can name our archive something like test.app.aar so that when it is unarchived, it will have a folder name titled test.app. Within that app will be an expected application bundle holding the executable.”

For the flaw to be exploited, the archive name must include an .app extension, there should be at least two files or folders in the root of the target directory being archive, as this triggers the auto-renaming of the temporary directory, and only the files and folders within the app should be archive, excluding the test.app directory. 

Jamf says that after disclosing it to Apple, the company patched the issue in July 2022, so users are advised to update as soon as possible.

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
Security
Microsoft reveals more on a potentially major Apple macOS security flaw
A person at a laptop with a cybersecure lock symbol floating above it.
Parallels Desktop has some worrying security flaws for Mac users
A computer being guarded by cybersecurity.
Worrying Windows security issue patched by 7-Zip, so patch now
Apple's new "Share Item Location" feature for AirTags.
Apple security alert - zero-day patched, so update your devices now
A person in a wheelchair working at a computer.
Why betting on Mac security could put your organization at risk
Illustration of a laptop with a magnifying glass exposing a beetle on-screen
This devious macOS malware is evading capture by using Apple's own encryption
Latest in Security
cybersecurity
Chinese government hackers allegedly spent years undetected in foreign phone networks
Data leak
A major Keenetic router data leak could put a million households at risk
Code Skull
Interpol operation arrests 300 suspects linked to African cybercrime rings
Insecure network with several red platforms connected through glowing data lines and a black hat hacker symbol
Multiple routers hit by new critical severity remote command injection vulnerability, with no fix in sight
Code Skull
This dangerous new ransomware is hitting Windows, ARM, ESXi systems
An abstract image of a lock against a digital background, denoting cybersecurity.
Critical security flaw in Next.js could spell big trouble for JavaScript users
Latest in News
DeepSeek
Deepseek’s new AI is smarter, faster, cheaper, and a real rival to OpenAI's models
Open AI
OpenAI unveiled image generation for 4o – here's everything you need to know about the ChatGPT upgrade
Apple WWDC 2025 announced
Apple just announced WWDC 2025 starts on June 9, and we'll all be watching the opening event
Hornet swings their weapon in mid air
Hollow Knight: Silksong gets new Steam metadata changes, convincing everyone and their mother that the game is finally releasing this year
OpenAI logo
OpenAI just launched a free ChatGPT bible that will help you master the AI chatbot and Sora
An aerial view of an Instavolt Superhub for charging electric vehicles
Forget gas stations – EV charging Superhubs are using solar power to solve the most annoying thing about electric motoring