{"id":48721,"date":"2025-07-31T16:46:43","date_gmt":"2025-07-31T20:46:43","guid":{"rendered":"https:\/\/mjtsai.com\/blog\/?p=48721"},"modified":"2025-07-31T16:46:43","modified_gmt":"2025-07-31T20:46:43","slug":"sploitlight","status":"publish","type":"post","link":"https:\/\/mjtsai.com\/blog\/2025\/07\/31\/sploitlight\/","title":{"rendered":"Sploitlight"},"content":{"rendered":"<p><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2025\/07\/28\/sploitlight-analyzing-a-spotlight-based-macos-tcc-vulnerability\/\">Microsoft Threat Intelligence<\/a> (<a href=\"https:\/\/www.macrumors.com\/2025\/07\/28\/microsoft-macos-spotlight-vulnerability\/\">MacRumors<\/a>):<\/p>\n<blockquote cite=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2025\/07\/28\/sploitlight-analyzing-a-spotlight-based-macos-tcc-vulnerability\/\"><p>Microsoft Threat Intelligence has discovered a macOS vulnerability that could allow attackers to steal private data of files normally protected by Transparency, Consent, and Control (TCC), such as files in the <em>Downloads<\/em> folder, as well as caches utilized by Apple Intelligence. While similar to prior TCC bypasses like <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2024\/10\/17\/new-macos-vulnerability-hm-surf-could-lead-to-unauthorized-data-access\/\">HM-Surf<\/a> and <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2022\/01\/10\/new-macos-vulnerability-powerdir-could-lead-to-unauthorized-user-data-access\/\">powerdir<\/a>, the implications of this vulnerability, which we refer to as &ldquo;Sploitlight&rdquo; for its use of Spotlight plugins, are more severe due to its ability to extract and leak sensitive information cached by Apple Intelligence, such as precise geolocation data, photo and video metadata, face and person recognition data, search history and user preferences, and more. These risks are further complicated and heightened by the remote linking capability between iCloud accounts, meaning an attacker with access to a user&rsquo;s macOS device could also exploit the vulnerability to determine remote information of other devices linked to the same iCloud account.<\/p><p>[&#8230;]<\/p><p>On modern macOS systems, Spotlight plugins are not even permitted to read or write any file other than the one being scanned. However, we have concluded that this is insufficient, as there are multiple ways for attackers to exfiltrate the file&rsquo;s contents.<\/p><p>[&#8230;]<\/p><p>Change the bundle&rsquo;s <em>Info.plist<\/em> and <em>schema.xml<\/em> files to declare the file types they wish to leak in <a href=\"https:\/\/developer.apple.com\/library\/archive\/documentation\/FileManagement\/Conceptual\/understanding_utis\/understand_utis_intro\/understand_utis_intro.html\">UTI<\/a> form. Since we assume an attacker runs locally, this is always possible to resolve, even for dynamic types.<\/p><p>Copy the bundle into <em>~\/Library\/Spotlight<\/em> directory. Note the bundle does not need to be signed at all.<\/p><\/blockquote>\n\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/microsoft-macos-sploitlight-flaw-leaks-apple-intelligence-data\/\">Sergiu Gatlan<\/a>:<\/p>\n<blockquote cite=\"https:\/\/www.bleepingcomputer.com\/news\/security\/microsoft-macos-sploitlight-flaw-leaks-apple-intelligence-data\/\"><p>In recent years, Microsoft security researchers have found multiple other severe macOS vulnerabilities, including a SIP bypass <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/microsoft-shrootless-bug-lets-hackers-install-macos-rootkits\/\">dubbed &lsquo;Shrootless<\/a>&rsquo; (<a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-30892\">CVE-2021-30892<\/a>), reported in 2021, which enables attackers to install rootkits on compromised Macs.<\/p><p>More recently, they discovered a SIP bypass <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/microsoft-finds-macos-bug-that-lets-hackers-bypass-sip-root-restrictions\/\">dubbed &lsquo;Migraine&rsquo;<\/a> (<a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-32369\">CVE-2023-32369<\/a>) and a security flaw <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/microsoft-finds-macos-bug-that-lets-malware-bypass-security-checks\/\">named Achilles(<\/a><a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2022-42821\">CVE-2022-42821<\/a>), which can be exploited to install malware using untrusted apps that bypass Gatekeeper execution restrictions.<\/p><p>Last year, they reported <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/microsoft-macos-bug-lets-hackers-install-malicious-kernel-drivers\/\">another SIP bypass<\/a> flaw (<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-44243\">CVE-2024-44243<\/a>) that lets threat actors deploy malicious kernel drivers by loading third-party kernel extensions.<\/p><\/blockquote>\n\n<p><a href=\"https:\/\/x.com\/theevilbit\/status\/1949874621227884638\">Csaba Fitzl<\/a>:<\/p>\n<blockquote cite=\"https:\/\/x.com\/theevilbit\/status\/1949874621227884638\"><p>Apple failed to fix this so many times. I first reported this back in macOS Big Sur, and it&rsquo;s literally detailed in my EXP-312 course in &ldquo;Bypass TCC via Spotlight Importer Plugins&rdquo;<\/p><\/blockquote>\n\n<p><a href=\"https:\/\/x.com\/theevilbit\/status\/1949874979476066608\">Csaba Fitzl<\/a>:<\/p>\n<blockquote cite=\"https:\/\/x.com\/theevilbit\/status\/1949874979476066608\"><p>Then I reported it again and was fixed as CVE-2024-54533.<\/p><p>Looks like it still wasn&rsquo;t fixed properly.<\/p><\/blockquote>\n\n<p>See also: <a href=\"https:\/\/eclecticlight.co\/2025\/07\/30\/a-deeper-dive-into-spotlight-indexes\/\">Howard Oakley<\/a>.<\/p>\n\n<p>Previously:<\/p>\n<ul>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2024\/10\/21\/tcc-and-gatekeeper-bypasses\/\">TCC and Gatekeeper Bypasses<\/a><\/li>\n<\/ul>","protected":false},"excerpt":{"rendered":"<p>Microsoft Threat Intelligence (MacRumors): Microsoft Threat Intelligence has discovered a macOS vulnerability that could allow attackers to steal private data of files normally protected by Transparency, Consent, and Control (TCC), such as files in the Downloads folder, as well as caches utilized by Apple Intelligence. While similar to prior TCC bypasses like HM-Surf and powerdir, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"apple_news_api_created_at":"2025-07-31T20:46:46Z","apple_news_api_id":"ef973d71-3413-43f0-98fd-e14a618a2f23","apple_news_api_modified_at":"2025-07-31T20:46:46Z","apple_news_api_revision":"AAAAAAAAAAD\/\/\/\/\/\/\/\/\/\/w==","apple_news_api_share_url":"https:\/\/apple.news\/A75c9cTQTQ_CY_eFKYYovIw","apple_news_coverimage":0,"apple_news_coverimage_caption":"","apple_news_is_hidden":false,"apple_news_is_paid":false,"apple_news_is_preview":false,"apple_news_is_sponsored":false,"apple_news_maturity_rating":"","apple_news_metadata":"\"\"","apple_news_pullquote":"","apple_news_pullquote_position":"","apple_news_slug":"","apple_news_sections":"\"\"","apple_news_suppress_video_url":false,"apple_news_use_image_component":false,"footnotes":""},"categories":[2],"tags":[2602,2095,30,2598,355,1042,1960,768],"class_list":["post-48721","post","type-post","status-publish","format-standard","hentry","category-technology","tag-apple-intelligence","tag-exploit","tag-mac","tag-macos-15-sequoia","tag-privacy","tag-spotlight","tag-transparency-consent-and-control-tcc","tag-uniform-type-identifier"],"apple_news_notices":[],"_links":{"self":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/48721","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/comments?post=48721"}],"version-history":[{"count":1,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/48721\/revisions"}],"predecessor-version":[{"id":48722,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/48721\/revisions\/48722"}],"wp:attachment":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/media?parent=48721"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/categories?post=48721"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/tags?post=48721"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}