Categories: Cyber Security News

Critical ExifTool Flaw Lets Malicious Images Trigger Code Execution on macOS

A newly discovered vulnerability is challenging the long-held belief that macOS systems are inherently immune to malware.

Security researchers from Kaspersky’s Global Research and Analysis Team (GReAT) have identified a critical flaw that allows threat actors to execute malicious code on Macs simply by processing a tampered image file.

ExifTool, a widespread open-source utility for reading and editing file metadata, sits at the heart of this issue.

Sponsored

Because the tool operates silently in the background of many larger digital asset management systems, forensic platforms, and media processing scripts, users may be vulnerable without realizing they are using it.

How the Exploit Triggers Code Execution

To exploit this vulnerability, attackers hide malicious shell commands within a specific metadata field of an image file, known as DateTimeOriginal.

While the photo itself appears completely normal to the naked eye, this metadata field is deliberately written in an invalid format to house the hidden payload.

The vulnerability, officially tracked as CVE-2026-3102, is a Remote Code Execution (RCE) flaw triggered by manipulated image metadata.

His security issue specifically affects ExifTool versions 13.49 and earlier and is limited to macOS environments.

The critical flaw was discovered and reported by security researchers at Kaspersky’s Global Research and Analysis Team (GReAT).

The attack relies on two specific conditions to execute the commands. First, the processing must happen on a macOS system.

Second, the ExifTool application or underlying library must run with the -n (or –printConv) flag enabled.

This specific command-line mode instructs the software to output machine-readable data exactly as it is, intentionally skipping the standard processing that translates metadata into human-readable formats.

When these conditions align, the system bypasses safety checks and unthinkingly executes the shell commands.

Sponsored

In a real-world scenario, a media publication or forensics lab might receive a targeted document.

When their automated systems catalog the file and extract its metadata, the hidden commands silently trigger.

This initial breach allows attackers to download secondary payloads, such as infostealers or Trojans, compromising the device while the victim remains unaware.

Mitigations

Following the disclosure by Kaspersky researchers, the developer of ExifTool promptly released a patch.

Organizations and individual users must update their software workflows immediately to prevent potential exploitation.

To mitigate this threat, organizations should update ExifTool to version 13.50 or later and ensure no systems rely on vulnerable embedded versions.

Untrusted images should be processed in isolated environments, and organizations should deploy strong macOS security protections across all devices, including BYOD endpoints.

Because ExifTool is a foundational open-source component, organizations must also actively monitor their software supply chains using threat data feeds to identify outdated third-party libraries.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

The post Critical ExifTool Flaw Lets Malicious Images Trigger Code Execution on macOS appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Yashica’s new retro point-and-shoot revival sounds surprisingly capable for $100

The Yashica Tank looks like a camera that costs way more than it does. |…

14 minutes ago

X says you can block Grok from editing your photos

Pay attention to that small print about tagging @Grok, this new toggle has disappointing limitations.…

14 minutes ago

Samsung’s Mario-themed microSD card for Switch 2 is 35 percent off

Add more games to your Switch 2 with a microSD Express card. | Photo: Amelia…

15 minutes ago

Zen Media launches GEO GPT to measure brand visibility in AI Answers

Zen Media, an AI visibility agency has launched GEO GPT, a new diagnostic tool designed…

24 minutes ago

News from the week beginning March 2 2026

Some interesting research was published last week, with more to come this week. Logicalis released…

24 minutes ago

AI Didn’t Break Enterprise Delivery. Fragmented Engineering Did!

Enterprise technology environments now are more complex than at any point in the past decade.…

24 minutes ago

This website uses cookies.