[Japanese]

JVNDB-2023-000092

"direct" Desktop App for macOS fails to restrict access permissions

Overview

"direct" Desktop App for macOS provided by L is B Corp. fails to restrict access permissions (CWE-284).
The access control mechanism provided by macOS "TCC (Transparency Consent and Control)" may be bypassed.

Koh M. Nakagawa of FFRI Security, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVSS Severity (What is CVSS?)

CVSS V3 Severity:
Base Metrics 4.4 (Medium) [IPA Score]
  • Attack Vector: Local
  • Attack Complexity: Low
  • Privileges Required: Low
  • User Interaction: None
  • Scope: Unchanged
  • Confidentiality Impact: Low
  • Integrity Impact: Low
  • Availability Impact: None
CVSS V2 Severity:
Base Metrics 3.2 (Low) [IPA Score]
  • Access Vector: Local
  • Access Complexity: Low
  • Authentication: Single Instance
  • Confidentiality Impact: Partial
  • Integrity Impact: Partial
  • Availability Impact: None
Affected Products


L is B Corp.
  • direct Desktop App for macOS ver 2.6.0 and earlier

Impact

Camrea, microphone, etc. of the device where the product is installed may be used without the user's consent. As a result, the recorded image/audio data may be obtained.
Solution

[Update the software]
Update the software to the latest version according to the information provided by the developer.

Note that the existence of the vulnerability has not been confirmed in the App's Windows version, but as it is using a similar mechanism as the Mac version, an update has been released for it as well.
Vendor Information

L is B Corp.
CWE (What is CWE?)

  1. Permissions(CWE-264) [IPA Evaluation]
CVE (What is CVE?)

  1. CVE-2023-41775
References

  1. JVN : JVN#42691027
  2. National Vulnerability Database (NVD) : CVE-2023-41775
Revision History

  • [2023/09/06]
      Web page was published
  • [2024/05/13]
      References : Content was added