Bypassing TCC Policies in Rocket.Chat Application for macOS
CVE-2024-8270

5.5MEDIUM

Key Information:

Vendor
CVE Published:
11 June 2025

What is CVE-2024-8270?

The Rocket.Chat application for macOS has a significant vulnerability that allows attackers to bypass Transparency, Consent, and Control (TCC) policies. This flaw enables the exploitation of permissions, including access to the microphone and camera, through improper application signing and lack of Hardened Runtime usage. The absence of Library Validation can lead to DYLIB injection attacks, allowing unauthorized actions and the escalation of permissions beyond the intended application profile, thereby compromising user security.

Affected Version(s)

Rocket.Chat Desktop MacOS 0 <= 4.1.2

References

CVSS V3.1

Score:
5.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

.