Skip to main content

Security researchers warn of a new class of Apple bugs

Security researchers say they have uncovered a “new class” of vulnerabilities that could allow attackers to bypass Apple’s security protections in iOS and macOS to access users’ sensitive data.

Trellix’s Advanced Research Center published details this week of the privilege escalation vulnerabilities — meaning they allow someone to gain an elevated level of access to the system — affecting both iPhones and Macs. Trellix warned that the class of bugs, which range from medium to high severity, could — if left unpatched — allow malicious apps to escape their protective “sandbox” and access sensitive information on someone’s device, including a person’s messages, location data, call history and photos.

Trellix’s findings follow earlier research from Google and Citizen Lab, which in 2021 discovered a new zero-day exploit dubbed ForcedEntry that was abused by Israeli spyware maker NSO Group to remotely and stealthily hack into iPhones at the behest of its government customers. Apple subsequently strengthened its device security protections by adding in new code-signing mitigations, which cryptographically verify that the device’s software is trusted and hasn’t been modified, to stop the exploitation of the exploit.

But Trellix said this week that the mitigations put in place by Apple are insufficient to prevent similar attacks.

In a blog post, Trellix said the new bugs involve NSPredicate, a tool that allows developers to filter code, around which Apple tightened restrictions following the ForcedEntry bug through a protocol called NSPredicateVisitor. But Trellix said that nearly every implementation of NSPredicateVisitor “could be bypassed.”

While Trellix has seen no evidence to suggest that these vulnerabilities have been actively exploited, the cybersecurity company tells TechCrunch that its research shows that iOS and macOS are “not inherently more secure” than other operating systems.

“The vulnerabilities uncovered by our team this week have fundamentally broken their security model,” said Doug McKee, director of Vulnerability Research at Trellix, adding that the bugs could have, in theory, exposed affected Apple devices to a wide range of attack vectors and made it easier for improper access to sensitive data. “These bugs essentially allow an attacker that has achieved low privileged code execution, i.e., basic functions on macOS or iOS, to gain much higher privileges.”

Apple patched the vulnerabilities Trellix found in its macOS 13.2 and iOS 16.3 software updates, released in January. Apple’s security support documents were also updated on Tuesday to reflect the release of the new patches.

Will Strafach, a security researcher and founder of the Guardian firewall app, described the vulnerabilities as “pretty clever,” but warned that there is little the average user can do about these threats, “besides staying vigilant about installing security updates.”

And iOS and macOS security researcher Wojciech Reguła told TechCrunch that while the vulnerabilities could be significant, in the absence of exploits, more details are needed to determine how big this attack surface is.

Jamf’s Michael Covington said that Apple’s code-signing measures were “never intended to be a silver bullet or a lone solution” for protecting device data. “The vulnerabilities, though noteworthy, show how layered defenses are so critical to maintaining good security posture,” Covington said.

When reached, Apple did not provide an on-the-record comment.

Security researchers warn of a new class of Apple bugs by Carly Page originally published on TechCrunch



source https://techcrunch.com/2023/02/22/security-researchers-warn-of-new-class-of-apple-bugs/

Comments

Popular posts from this blog

Max Q: Psyche(d)

In this issue: SpaceX launches NASA asteroid mission, news from Relativity Space and more. © 2023 TechCrunch. All rights reserved. For personal use only. from TechCrunch https://ift.tt/h6Kjrde via IFTTT

Max Q: Anomalous

Hello and welcome back to Max Q! Last week wasn’t the most successful for spaceflight missions. We’ll get into that a bit more below. In this issue: First up, a botched launch from Virgin Orbit… …followed by one from ABL Space Systems News from Rocket Lab, World View and more Virgin Orbit’s botched launch highlights shaky financial future After Virgin Orbit’s launch failure last Monday, during which the mission experienced an  “anomaly” that prevented the rocket from reaching orbit, I went back over the company’s financials — and things aren’t looking good. For Virgin Orbit, this year has likely been completely turned on its head. The company was aiming for three launches this year, but everything will remain grounded until the cause of the anomaly has been identified and resolved. It’s unclear how long that will take, but likely at least three months. Add this delay to Virgin’s dwindling cash reserves and you have a foundation that’s suddenly much shakier than before. ...

What’s Stripe’s deal?

Welcome to  The Interchange ! If you received this in your inbox, thank you for signing up and your vote of confidence. If you’re reading this as a post on our site, sign up  here  so you can receive it directly in the future. Every week, I’ll take a look at the hottest fintech news of the previous week. This will include everything from funding rounds to trends to an analysis of a particular space to hot takes on a particular company or phenomenon. There’s a lot of fintech news out there and it’s my job to stay on top of it — and make sense of it — so you can stay in the know. —  Mary Ann Stripe eyes exit, reportedly tried raising at a lower valuation The big news in fintech this week revolved around payments giant Stripe . On January 26, my Equity Podcast co-host and overall amazingly talented reporter Natasha Mascarenhas and I teamed up to write about how Stripe had set a 12-month deadline for itself to go public, either through a direct listing or by pursuin...