You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
ARD provides versatile control levels, including observation, shared control, and full control, with sessions persisting even after user password changes. It allows sending Unix commands directly, executing them as root for administrative users. Task scheduling and Remote Spotlight search are notable features, facilitating remote, low-impact searches for sensitive files across multiple machines.
|2023|CVE-2023-42940|Screen Sharing|Incorrect session rendering could cause the *wrong* desktop or window to be transmitted, resulting in leakage of sensitive information|macOS Sonoma 14.2.1 (Dec 2023) |
46
+
|2024|CVE-2024-23296|launchservicesd / login|Kernel memory-protection bypass that can be chained after a successful remote login (actively exploited in the wild)|macOS Ventura 13.6.4 / Sonoma 14.4 (Mar 2024) |
47
+
48
+
**Hardening tips**
49
+
50
+
* Disable *Screen Sharing*/*Remote Management* when not strictly required.
51
+
* Keep macOS fully patched (Apple generally ships security fixes for the last three major releases).
52
+
* Use a **Strong Password***and* enforce the *“VNC viewers may control screen with password”* option **disabled** when possible.
53
+
* Put the service behind a VPN instead of exposing TCP 5900/3283 to the Internet.
54
+
* Add an Application Firewall rule to limit `ARDAgent` to the local subnet:
sudo /usr/libexec/ApplicationFirewall/socketfilterfw --setblockapp /System/Library/CoreServices/RemoteManagement/ARDAgent.app/Contents/MacOS/ARDAgent on
59
+
```
60
+
61
+
---
62
+
41
63
## Bonjour Protocol
42
64
43
65
Bonjour, an Apple-designed technology, allows **devices on the same network to detect each other's offered services**. Known also as Rendezvous, **Zero Configuration**, or Zeroconf, it enables a device to join a TCP/IP network, **automatically choose an IP address**, and broadcast its services to other network devices.
@@ -111,6 +133,43 @@ finally:
111
133
zeroconf.close()
112
134
```
113
135
136
+
### Enumerating Bonjour over the network
137
+
138
+
***Nmap NSE** – discover services advertised by a single host:
The `dns-service-discovery` script sends a `_services._dns-sd._udp.local` query and then enumerates each advertised service type.
145
+
146
+
***mdns_recon** – Python tool that scans entire ranges looking for *misconfigured* mDNS responders that answer unicast queries (useful to find devices reachable across subnets/WAN):
3. For environments where Bonjour is required internally but must never cross network boundaries, use *AirPlay Receiver* profile restrictions (MDM) or an mDNS proxy.
171
+
4. Enable **System Integrity Protection (SIP)** and keep macOS up to date – both vulnerabilities above were patched quickly but relied on SIP being enabled for full protection.
172
+
114
173
### Disabling Bonjour
115
174
116
175
If there are concerns about security or other reasons to disable Bonjour, it can be turned off using the following command:
0 commit comments