Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

4/3/2020
04:00 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Researcher Hijacks iOS, macOS Camera with Three Safari Zero-Days

A security researcher earned $75,000 for finding a whopping seven zero-days in Safari, three of which can be combined to access the camera.

Apple has rewarded a security researcher $75,000 for discovering a total of seven zero-days in the Safari browser. Using only three of these flaws, an intruder could build an attack chain and access the camera and microphone on iOS and macOS devices to spy on unsuspecting people.

Ryan Pickren shared his discoveries with Apple in December 2019. The company patched the camera exploit in Safari 13.0.5, released on Jan. 28; the remaining zero-days were fixed in Safari 13.1, released on March 24. They were assigned these CVEs: CVE-2020-3852, CVE-2020-3864, CVE-2020-3865, CVE-2020-3885, CVE-2020-3887, CVE-2020-9784, and CVE-2020-9787.

Last December, Pickren decided to dig into Safari to "hammer the browser with obscure corner cases" until he discovered weird behavior that could be combined into a kill chain. He already had experience hunting for Safari bugs: In late 2018, when he was a penetration tester for Amazon Web Services, Pickren received seven universal cross-site scripting (UXSS) CVEs in the browser. However, he notes, these were found before Apple opened its bug bounty program to all security researchers in December 2019. 

Pickren says his main goal for this project was to access the camera on iOS and macOS devices. All the other vulnerabilities he uncovered along the way were considered "bonus bugs."

"It took about two weeks of intense research," Pickren says of the process that led to the discovery of seven zero-days. The project required him to "dive deep into HTML spec" and spend "countless hours" doing trial and error, he adds. "I was honestly pretty surprised by how many speed bumps I ran into," he says. "However, I was lucky enough to find bypasses for all of them."

The camera security model in iOS and macOS "is pretty intense," Pickren writes in a technical blog post on his findings. As Apple users know, each app must be explicitly granted permission to access the camera and microphone. Most do this by displaying a pop-up alert on the screen.

But as with all rules, there is an exception: Apple's own apps have free camera access and can open it without asking permission. Further, Pickren adds, new Web technologies like the MediaDevices Web API allow websites to leverage Safari's permission to access the camera. "But ... this new web-based camera tech undermines the OS's native camera security model," he says.

The vulnerabilities he found exist in the way Safari parsed Uniform Resource Identifiers (URIs), managed Web origins, and initialized secure contexts. The camera attack chain could let malicious websites disguise themselves as trusted sites when viewed on Safari. If an attacker created a website and wanted camera access, it would only need to pretend to be a conference site like Skype or Zoom. Stringing the three flaws together would let the site access the camera.

"Any attacker with the ability to run JavaScript in the victim's browser can launch this attack," Pickren says. "A realistic scenario is a rogue ad banner," but any JavaScript code with the ability to create a pop-up – for example, a standalone website or browser extension – could work. Safari shows a red camera icon in the URL bar when the camera is accessed via desktop; however, someone not trained to look for this could miss it. There is no light indicator on any iOS devices. 

Pickren reported the bug to Apple under its Security Bounty Program rules and provided a live demo under BugPoC. Apple classified the camera exploit under the category "Network Attack without User Interaction: Zero-Click Unauthorized Access to Sensitive Data" and paid $75,000.

Related Content:

Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's featured story: "This is Not Your Father’s Ransomware."

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
unturista
50%
50%
unturista,
User Rank: Apprentice
4/5/2020 | 4:50:26 AM
Nice
Nice
Commentary
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
Edge-DRsplash-11-edge-ask-the-experts
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
News
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Google's new See No Evil policy......
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-24368
PUBLISHED: 2021-06-20
The Quiz And Survey Master – Best Quiz, Exam and Survey Plugin WordPress plugin before 7.1.18 did not sanitise or escape its result_id parameter when displaying an existing quiz result page, leading to a reflected Cross-Site Scripting issue. This c...
CVE-2021-31664
PUBLISHED: 2021-06-18
RIOT-OS 2021.01 before commit 44741ff99f7a71df45420635b238b9c22093647a contains a buffer overflow which could allow attackers to obtain sensitive information.
CVE-2021-33185
PUBLISHED: 2021-06-18
SerenityOS contains a buffer overflow in the set_range test in TestBitmap which could allow attackers to obtain sensitive information.
CVE-2021-33186
PUBLISHED: 2021-06-18
SerenityOS in test-crypto.cpp contains a stack buffer overflow which could allow attackers to obtain sensitive information.
CVE-2021-31272
PUBLISHED: 2021-06-18
SerenityOS before commit 3844e8569689dd476064a0759d704bc64fb3ca2c contains a directory traversal vulnerability in tar/unzip that may lead to command execution or privilege escalation.