MS unveils exploit code for macOS sandbox escape vulnerability

Microsoft has published the exploit code for a vulnerability in macOS that can help an attacker bypass sandbox restrictions and run code on the system.

The company releases the technical details for the security issue, currently identified as CVE-2022-26706, and explains how the macOS App Sandbox rule can be avoided to allow malicious macro code in Word documents to execute commands on the machine.

Misusing macros in Office documents to deploy malware has long been an efficient and popular technique to compromise Windows systems.

The same could be achieved on macOS machines lacking the proper security updates, Microsoft warns in a report today.

“Jonathan Bar-Or of the Microsoft 365 Defender Research Team explains that the vulnerability was discovered while looking into methods to run and detect malicious macros in Microsoft Office documents on macOS,” a source as per Bleeping Computer.

To make sure backward compatibility, Microsoft Word can read and write files that come with the prefix “~$,” which is explained in the app’s sandbox rules.

Readers like you help support The Tech Outlook. When you make a purchase using links on our site, we may earn an affiliate commission. We cannot guarantee the Product information shown is 100% accurate and we advise you to check the product listing on the original manufacturer website. Thetechoutlook is not responsible for price changes carried out by retailers. The discounted price or deal mentioned in this item was available at the time of writing and may be subject to time restrictions and/or limited unit availability. Amazon and the Amazon logo are trademarks of, Inc. or its affiliates Read More


This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More