Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

8/20/2019
05:21 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Apple Misstep Leaves iPhones Open to Jailbreak

Newest version of iOS contains a critical bug that the company had previously already patched.

In a somewhat uncharacteristic blunder, Apple has left iPhones running iOS 12.4, the latest version of its mobile operating system, open to a security bug that the company previously had fixed.

One security researcher has quickly taken advantage of the opportunity to develop and publicly release an exploit for jail-breaking iPhones running iOS 12.4.

This is believed to be the first time in several years that a jailbreak for the most updated version of iOS has become publicly available before a patch for it has been released. Typically, such unpatched Apple exploits can fetch hundreds of thousands of dollars and sometimes, even millions of dollars in dark markets.

Jailbreaking gives iPhone users a way to get past Apple's restrictions and install unapproved applications and services on their devices or to change settings that they normally wouldn't be able to change.

Some security researchers are concerned that attackers could use the unpatched exploit to try and launch attacks on iPhone users via tainted apps, remote exploits, and other methods. Others believe such concerns are overblown.

Apple did not respond immediately to a request seeking comment on the issue or on what the company is doing to address it. But some believe it will issue an update quickly, considering the risks to iPhone users.

News of the latest issue somewhat ironically comes just days after Apple announced a major bug bounty program with big incentives for researchers who find bugs in some of the company's products.

"Apple has historically been very expedient in patching vulnerabilities, so I would expect to see an update pretty soon," says Terence Jackson, chief information security officer at Thycotic. "But until then, iPhone users should exercise a little extra discretion when downloading applications and opening links in email, iMessages, or a browser.”

According to Motherboard, the first to report on the issue, security researchers recently discovered that in developing iOS 12.4 Apple had inadvertently reopened a remote code execution bug (CVE-2019-8605) that the company had patched in the previous iOS 12.3 version.  Google Project Zero researcher Ned Williamson reported that issue to Google earlier this year. Apple had described the bug as a "use after free issue [that] was addressed with improved memory management."

Apple's iOS 12.4 among other things contained a fix for another critical vulnerability that allowed attackers to gain access to iPhones via a malicious iMessage.

Muted Risk

Aaron Zander, head of IT at HackerOne, says that the new jailbreak is a "very cool thing" considering how unusual they have become. However, since the vulnerability and the exploit are now public, the associated risks are more manageable. "This is way different than Apple being completely unaware of the vulnerability and allowing exploits to run wild," Zander says.

The bigger issue is how frequently such missteps happen, he says. Typically, companies develop their major software versions separately from their minor releases - for instance, an X.4 version versus an X.4.1 release. In merging minor and major releases, sometimes changes get missed. "This unfortunately happens all the time, which demonstrates why retesting is so important," Zander notes.

Chris Morales, head of security analytics at Vectra, says some people are likely more excited that they can jailbreak their iPhone while still having the latest version of iOS, and aren't worried about the security risks. "The risk here is that a malicious app can get into the Apple store and exploit a vulnerability. While feasible, it is most likely not a regular occurrence or any more of a risk than already existed," Morales says.

Related Content:

Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's top story: "5 Ways to Improve the Patching Process."

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
elinagomes
50%
50%
elinagomes,
User Rank: Apprentice
1/30/2020 | 1:12:47 AM
Same Problem I have Faced
I was also facing the same issue on my iPhone. This may happen for some server issues and there was an error connecting to the apple id server. I am looking for the proper guidance for this.
44% of Security Threats Start in the Cloud
Kelly Sheridan, Staff Editor, Dark Reading,  2/19/2020
Zero-Factor Authentication: Owning Our Data
Nick Selby, Chief Security Officer at Paxos Trust Company,  2/19/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
How Enterprises Are Developing and Maintaining Secure Applications
How Enterprises Are Developing and Maintaining Secure Applications
The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-8818
PUBLISHED: 2020-02-25
An issue was discovered in the CardGate Payments plugin through 2.0.30 for Magento 2. Lack of origin authentication in the IPN callback processing function in Controller/Payment/Callback.php allows an attacker to remotely replace critical plugin settings (merchant ID, secret key, etc.) and therefore...
CVE-2020-8819
PUBLISHED: 2020-02-25
An issue was discovered in the CardGate Payments plugin through 3.1.15 for WooCommerce. Lack of origin authentication in the IPN callback processing function in cardgate/cardgate.php allows an attacker to remotely replace critical plugin settings (merchant ID, secret key, etc.) and therefore bypass ...
CVE-2020-9385
PUBLISHED: 2020-02-25
A NULL Pointer Dereference exists in libzint in Zint 2.7.1 because multiple + characters are mishandled in add_on in upcean.c, when called from eanx in upcean.c during EAN barcode generation.
CVE-2020-9382
PUBLISHED: 2020-02-24
An issue was discovered in the Widgets extension through 1.4.0 for MediaWiki. Improper title sanitization allowed for the execution of any wiki page as a widget (as defined by this extension) via MediaWiki's } parser function.
CVE-2020-1938
PUBLISHED: 2020-02-24
When using the Apache JServ Protocol (AJP), care must be taken when trusting incoming connections to Apache Tomcat. Tomcat treats AJP connections as having higher trust than, for example, a similar HTTP connection. If such connections are available to an attacker, they can be exploited in ways that ...