Researchers discovered an Apple vulnerability that threat actors can use to deploy undeletable malware. In order to exploit CVE-2023-32369, hackers need to previously gain root privileges over the device. The Apple bug enables them to bypass System Integrity Protection (SIP) and access the victim`s private data by evading Transparency, Consent, and Control (TCC) security checks. […]
The post MacOS Vulnerability Enables Hackers to Bypass SIP Root Restrictions appeared first on Heimdal Security Blog.
This article has been indexed from Heimdal Security Blog
Read the original article: