In a recent discovery by Microsoft Threat Intelligence, a critical vulnerability in macOS has been identified that enables attackers to bypass Apple’s System Integrity Protection (SIP). Designated as CVE-2024-44243, this vulnerability poses a serious security risk for macOS users by allowing the loading of third-party kernel extensions, opening the door to potential exploitation by malicious actors. Fortunately, Apple has released a patch to address this issue as part of its December 11, 2024, security update, thanks to the joint efforts of Microsoft and security researcher Mickey Jin, who responsibly reported the vulnerability to Apple.
System Integrity Protection (SIP) is a foundational security feature of macOS that aims to prevent system-level operations that could compromise the integrity of the operating system. By enforcing restrictions even on users with root privileges, SIP plays a crucial role in protecting macOS devices from unauthorized modifications, enhancing security against various threats like malware and rootkits. Despite the robustness of SIP, the CVE-2024-44243 vulnerability identified by Microsoft exposes the potential vulnerabilities that could be exploited, posing significant risks for users.
The research conducted by Microsoft uncovered that the Storage Kit daemon (storagekitd), a vital macOS process responsible for disk state operations, could be manipulated to bypass SIP protections. By leveraging this vulnerability, attackers with root privileges could introduce custom file system bundles that trigger unauthorized operations, ultimately overriding Apple’s kernel extension exclusion list. This type of exploitation could lead to the installation of persistent malware, evasion of macOS’s Transparency, Consent, and Control (TCC) framework, tampering with security solutions, and widening the attack surface for additional exploits.
Microsoft’s proactive approach to identifying and mitigating the CVE-2024-44243 vulnerability showcases the power of advanced monitoring techniques employed through Microsoft Defender for Endpoint. By closely monitoring processes with special entitlements that could potentially lead to SIP bypasses, Microsoft was able to flag anomalous behaviors and promptly address the security issue. Additionally, Microsoft Defender Vulnerability Management plays a crucial role in rapidly detecting and resolving vulnerabilities like CVE-2024-44243, ensuring comprehensive protection for users against emerging threats.
Apple’s swift response to the vulnerability and collaboration with Microsoft and Mickey Jin to release a patch in the December 2024 security update highlights the importance of responsible disclosure and coordinated efforts within the security community. macOS users are advised to update their systems promptly to mitigate the risks associated with this vulnerability and follow best security practices to safeguard their devices against potential threats. As cyber threats continue to evolve, continuous security research, proactive detection, and collaborative efforts are essential to maintain the integrity of modern operating systems and protect users against emerging risks.

