Skip to main content

Security researchers warn of a new class of Apple bugs

Security researchers say they have uncovered a “new class” of vulnerabilities that could allow attackers to bypass Apple’s security protections in iOS and macOS to access users’ sensitive data.

Trellix’s Advanced Research Center published details this week of the privilege escalation vulnerabilities — meaning they allow someone to gain an elevated level of access to the system — affecting both iPhones and Macs. Trellix warned that the class of bugs, which range from medium to high severity, could — if left unpatched — allow malicious apps to escape their protective “sandbox” and access sensitive information on someone’s device, including a person’s messages, location data, call history and photos.

Trellix’s findings follow earlier research from Google and Citizen Lab, which in 2021 discovered a new zero-day exploit dubbed ForcedEntry that was abused by Israeli spyware maker NSO Group to remotely and stealthily hack into iPhones at the behest of its government customers. Apple subsequently strengthened its device security protections by adding in new code-signing mitigations, which cryptographically verify that the device’s software is trusted and hasn’t been modified, to stop the exploitation of the exploit.

But Trellix said this week that the mitigations put in place by Apple are insufficient to prevent similar attacks.

In a blog post, Trellix said the new bugs involve NSPredicate, a tool that allows developers to filter code, around which Apple tightened restrictions following the ForcedEntry bug through a protocol called NSPredicateVisitor. But Trellix said that nearly every implementation of NSPredicateVisitor “could be bypassed.”

While Trellix has seen no evidence to suggest that these vulnerabilities have been actively exploited, the cybersecurity company tells TechCrunch that its research shows that iOS and macOS are “not inherently more secure” than other operating systems.

“The vulnerabilities uncovered by our team this week have fundamentally broken their security model,” said Doug McKee, director of Vulnerability Research at Trellix, adding that the bugs could have, in theory, exposed affected Apple devices to a wide range of attack vectors and made it easier for improper access to sensitive data. “These bugs essentially allow an attacker that has achieved low privileged code execution, i.e., basic functions on macOS or iOS, to gain much higher privileges.”

Apple patched the vulnerabilities Trellix found in its macOS 13.2 and iOS 16.3 software updates, released in January. Apple’s security support documents were also updated on Tuesday to reflect the release of the new patches.

Will Strafach, a security researcher and founder of the Guardian firewall app, described the vulnerabilities as “pretty clever,” but warned that there is little the average user can do about these threats, “besides staying vigilant about installing security updates.”

And iOS and macOS security researcher Wojciech Reguła told TechCrunch that while the vulnerabilities could be significant, in the absence of exploits, more details are needed to determine how big this attack surface is.

Jamf’s Michael Covington said that Apple’s code-signing measures were “never intended to be a silver bullet or a lone solution” for protecting device data. “The vulnerabilities, though noteworthy, show how layered defenses are so critical to maintaining good security posture,” Covington said.

When reached, Apple did not provide an on-the-record comment.

Security researchers warn of a new class of Apple bugs by Carly Page originally published on TechCrunch



source https://techcrunch.com/2023/02/22/security-researchers-warn-of-new-class-of-apple-bugs/

Comments

Popular posts from this blog

Apple’s AI Push: Everything We Know About Apple Intelligence So Far

Apple’s WWDC 2025 confirmed what many suspected: Apple is finally making a serious leap into artificial intelligence. Dubbed “Apple Intelligence,” the suite of AI-powered tools, enhancements, and integrations marks the company’s biggest software evolution in a decade. But unlike competitors racing to plug AI into everything, Apple is taking a slower, more deliberate approach — one rooted in privacy, on-device processing, and ecosystem synergy. If you’re wondering what Apple Intelligence actually is, how it works, and what it means for your iPhone, iPad, or Mac, you’re in the right place. This article breaks it all down.   What Is Apple Intelligence? Let’s get the terminology clear first. Apple Intelligence isn’t a product — it’s a platform. It’s not just a chatbot. It’s a system-wide integration of generative AI, machine learning, and personal context awareness, embedded across Apple’s OS platforms. Think of it as a foundational AI layer stitched into iOS 18, iPadOS 18, and m...

The Silent Revolution of On-Device AI: Why the Cloud Is No Longer King

Introduction For years, artificial intelligence has meant one thing: the cloud. Whether you’re asking ChatGPT a question, editing a photo with AI tools, or getting recommendations on Netflix — those decisions happen on distant servers, not your device. But that’s changing. Thanks to major advances in silicon, model compression, and memory architecture, AI is quietly migrating from giant data centres to the palm of your hand. Your phone, your laptop, your smartwatch — all are becoming AI engines in their own right. It’s a shift that redefines not just how AI works, but who controls it, how private it is, and what it can do for you. This article explores the rise of on-device AI — how it works, why it matters, and why the cloud’s days as the centre of the AI universe might be numbered. What Is On-Device AI? On-device AI refers to machine learning models that run locally on your smartphone, tablet, laptop, or edge device — without needing constant access to the cloud. In practi...

Max Q: Psyche(d)

In this issue: SpaceX launches NASA asteroid mission, news from Relativity Space and more. © 2023 TechCrunch. All rights reserved. For personal use only. from TechCrunch https://ift.tt/h6Kjrde via IFTTT