Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

8/20/2019
05:21 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Apple Misstep Leaves iPhones Open to Jailbreak

Newest version of iOS contains a critical bug that the company had previously already patched.

In a somewhat uncharacteristic blunder, Apple has left iPhones running iOS 12.4, the latest version of its mobile operating system, open to a security bug that the company previously had fixed.

One security researcher has quickly taken advantage of the opportunity to develop and publicly release an exploit for jail-breaking iPhones running iOS 12.4.

This is believed to be the first time in several years that a jailbreak for the most updated version of iOS has become publicly available before a patch for it has been released. Typically, such unpatched Apple exploits can fetch hundreds of thousands of dollars and sometimes, even millions of dollars in dark markets.

Jailbreaking gives iPhone users a way to get past Apple's restrictions and install unapproved applications and services on their devices or to change settings that they normally wouldn't be able to change.

Some security researchers are concerned that attackers could use the unpatched exploit to try and launch attacks on iPhone users via tainted apps, remote exploits, and other methods. Others believe such concerns are overblown.

Apple did not respond immediately to a request seeking comment on the issue or on what the company is doing to address it. But some believe it will issue an update quickly, considering the risks to iPhone users.

News of the latest issue somewhat ironically comes just days after Apple announced a major bug bounty program with big incentives for researchers who find bugs in some of the company's products.

"Apple has historically been very expedient in patching vulnerabilities, so I would expect to see an update pretty soon," says Terence Jackson, chief information security officer at Thycotic. "But until then, iPhone users should exercise a little extra discretion when downloading applications and opening links in email, iMessages, or a browser.”

According to Motherboard, the first to report on the issue, security researchers recently discovered that in developing iOS 12.4 Apple had inadvertently reopened a remote code execution bug (CVE-2019-8605) that the company had patched in the previous iOS 12.3 version.  Google Project Zero researcher Ned Williamson reported that issue to Google earlier this year. Apple had described the bug as a "use after free issue [that] was addressed with improved memory management."

Apple's iOS 12.4 among other things contained a fix for another critical vulnerability that allowed attackers to gain access to iPhones via a malicious iMessage.

Muted Risk

Aaron Zander, head of IT at HackerOne, says that the new jailbreak is a "very cool thing" considering how unusual they have become. However, since the vulnerability and the exploit are now public, the associated risks are more manageable. "This is way different than Apple being completely unaware of the vulnerability and allowing exploits to run wild," Zander says.

The bigger issue is how frequently such missteps happen, he says. Typically, companies develop their major software versions separately from their minor releases - for instance, an X.4 version versus an X.4.1 release. In merging minor and major releases, sometimes changes get missed. "This unfortunately happens all the time, which demonstrates why retesting is so important," Zander notes.

Chris Morales, head of security analytics at Vectra, says some people are likely more excited that they can jailbreak their iPhone while still having the latest version of iOS, and aren't worried about the security risks. "The risk here is that a malicious app can get into the Apple store and exploit a vulnerability. While feasible, it is most likely not a regular occurrence or any more of a risk than already existed," Morales says.

Related Content:

Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's top story: "5 Ways to Improve the Patching Process."

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
6 Small-Business Password Managers
Curtis Franklin Jr., Senior Editor at Dark Reading,  11/8/2019
Unreasonable Security Best Practices vs. Good Risk Management
Jack Freund, Director, Risk Science at RiskLens,  11/13/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-4108
PUBLISHED: 2019-11-14
Multiple unspecified vulnerabilities in Cryptocat Project Cryptocat 2.0.18 have unknown impact and attack vectors.
CVE-2018-12207
PUBLISHED: 2019-11-14
Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access.
CVE-2019-0117
PUBLISHED: 2019-11-14
Insufficient access control in protected memory subsystem for Intel(R) SGX for 6th, 7th, 8th, 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Xeon(R) Processor E3-1500 v5, v6 Families; Intel(R) Xeon(R) E-2100 & E-2200 Processor Families with Intel(R) Processor Graphics may allow a ...
CVE-2019-0123
PUBLISHED: 2019-11-14
Insufficient memory protection in Intel(R) 6th Generation Core Processors and greater, supporting SGX, may allow a privileged user to potentially enable escalation of privilege via local access.
CVE-2019-0124
PUBLISHED: 2019-11-14
Insufficient memory protection in Intel(R) 6th Generation Core Processors and greater, supporting TXT, may allow a privileged user to potentially enable escalation of privilege via local access.