HomeLatest NewsCyber SecurityMicrosoft Mac apps vulnerability may have exposed users' cameras and microphones to hackers

Microsoft Mac apps vulnerability may have exposed users’ cameras and microphones to hackers

A vulnerability in Microsoft macOS apps potentially allowed unauthorised access to cameras and microphones. Despite updates to some apps, concerns remain over unresolved security risks in others.

Preferred Source of Google

A recently uncovered vulnerability in Microsoft applications for may have allowed unauthorised access to Mac users’ cameras and microphones, according to findings by cybersecurity researchers at .

The flaw, which could be exploited through popular Microsoft apps like Outlook and Teams, underscores ongoing concerns about the security of widely used software.

Cisco Talos revealed that they had identified a vulnerability in several Microsoft apps for macOS that could have allowed attackers to gain access to a user’s camera and microphone without their knowledge.

Advertisement
Saksham Bharat 2026
Saksham Bharat 2026
A multi-stakeholder dialogue on skilling gap in Cybersecurity, Data Resilience and AI — and the roadmap to a Saksham Bharat.
Register Now →
VeeamON 2026 Tour India - Mumbai
VeeamON 2026 Tour India - Mumbai
A VeeamON 2026 India Leadership Series Mumbai for senior public sector and government technology leaders.
Register Now →
Cyber Surakshit Uttar Pradesh
Cyber Surakshit Uttar Pradesh
Find out strategies, frameworks and solutions for building a resilient and secure digital ecosystem across Uttar Pradesh.
Register Now →
VeeamON 2026 Tour India - Bengaluru
VeeamON 2026 Tour India - Bengaluru
A VeeamON 2026 India Leadership Series Bengaluru for senior public sector and government technology leaders.
Register Now →
VeeamON 2026 Tour India - Delhi
VeeamON 2026 Tour India - Delhi
A VeeamON 2026 India Leadership Series Delhi for senior public sector and government technology leaders.
Register Now →
Infosec Reimagined
Infosec Reimagined
Infosec Reimagined 2026 is the premier information security summit where top leaders—CISOs, CROs, CIOs, CTOs and risk executives—converge to redefine cyber resilience.
Register Now →
Digital Senate
Digital Senate
Digital Senate is a premier conference uniting government leaders, technologists and innovators to share ideas, success stories and strategies on digital governance, public sector transformation, cybersecurity and emerging technologies in India.
Register Now →
CIO Prism
CIO Prism
CIO Prism unites forward-thinking technology leaders to exchange transformative insights, shape digital strategies, and foster innovation, empowering enterprises to excel in an era of rapid technological change.
Register Now →

The researchers detailed the exploit works, explaining that it involves the injection of malicious code into these applications, effectively hijacking the permissions the user had already granted to the app.

macOS, Apple’s operating system, uses a framework known as Transparency, Consent, and Control (TCC) to manage permissions for access to sensitive resources like the camera, microphone, and location services.

Typically, an app needs specific entitlements to request such permissions, and without these entitlements, the app is unable to access these resources. However, the vulnerability identified by Cisco Talos allowed malicious software to take advantage of permissions that had already been granted to Microsoft apps.

Advertisement

The uncovered eight separate vulnerabilities across various Microsoft applications, which could enable attackers to bypass macOS’s permission model. This would allow them to use existing app permissions without any further user verification.

In practical terms, this means that a hacker could potentially develop software capable of recording audio or capturing photos without the user’s consent. Cisco Talos pointed out that all Microsoft apps, except for Excel, had the ability to record audio, and some could even access the camera.

Microsoft’s Response and Continuing Risks

Advertisement

Following the disclosure of these vulnerabilities, Microsoft classified the issue as “low risk,” citing the fact that the exploit relies on the loading of unsigned libraries, which are typically used to support third-party plugins.

In response, Microsoft has released updates for the macOS versions of Teams and OneNote to address how these applications handle library validation entitlements. However, other widely used apps, including Excel, PowerPoint, Word, and Outlook, remain potentially vulnerable.

Cisco Talos has raised concerns about Microsoft’s decision to disable certain security validations, particularly when there is no apparent need for additional libraries to be loaded. The researchers suggest that this could expose users to unnecessary risks.

The group also recommended that Apple consider making enhancements to the TCC framework to further protect users. One of their suggestions includes introducing user prompts when third-party plugins are loaded into apps that have already been granted permissions, which could mitigate the risk of similar vulnerabilities being exploited in the future.

Get the day's headlines from Tech Observer straight in your inbox

By subscribing you agree to our Privacy Policy, T&C and consent to receive newsletters and other important communications.
Tech Observer Desk
Tech Observer Desk
Tech Observer Desk at TechObserver.in is a team of technology reporters led by a senior editor who brings latest updates and developments from the world of technology.
- Advertisement -
Powered By Veeam Logo
- Advertisement -

Subscribe to our Newsletter

By subscribing you agree to our Privacy Policy, T&C and consent to receive newsletters and other important communications.
- Advertisement -

India to Lead Global IT Security Standards Body for Two Years

India will chair the Common Criteria Development Board from April 2026, gaining influence over international IT security certification standards recognised by 38 countries.

RELATED ARTICLES