Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Mobile

4/22/2020
05:20 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
100%
0%

Apple iOS Zero-Day Vulnerabilities Exploited in Targeted Attacks

One of the flaws is remotely exploitable with no user interaction needed, ZecOps says.

Attackers, likely belonging to a nation-state group, have been widely exploiting two unpatched vulnerabilities in Apple's iOS operating system since at least January 2018.

Their targets have included individuals from a Fortune 500 company in North America, a VIP from Germany, an executive from a telecommunications company in Japan, and several managed security services providers in Saudi Arabia and Israel, security vendor ZecOps disclosed in a report Wednesday.

Researchers from the startup discovered the zero-day vulnerabilities while conducting an incident response investigation at a customer site. Attackers can trigger the bugs by sending a specially crafted email to a target's iOS MobileMail inbox. The bugs are present in versions of iOS going to back to iOS 6 in 2012 all the way to the new iOS 13.4.1. It is possible that versions prior to iOS 6 are also affected, ZecOps said, adding that it hadn't verified if that was indeed the case.

Zero-day flaws, such as the ones ZecOps disclosed, are extremely rare in iOS and therefore likely to receive considerable attention from attackers and researchers. Researchers have previously noted how Apple zero-days can easily cost north of $1 million for those — such as governments and intelligence agencies — looking to purchase them from security researchers.

Apple did not respond immediately to a Dark Reading request for comment. But according to ZecOps, the company has developed and released a beta update of its operating system that contains a patch for the two flaws. The patch will become generally available when Apple releases iOS 13.4.5.

In a FAQ accompanying its bug discovery announcement, ZecOps said it had decided to release information on the flaws before a patch became available, for multiple reasons. "These bugs alone cannot cause harm to iOS users — since the attackers would require an additional infoleak bug and a kernel bug afterwards for full control over the targeted device," ZecOps said.

Both bugs were also already disclosed via Apple's publicly available beta update. Therefore, attackers already know about the issue and are likely keen one exploiting the issues as soon as possible. ZecOps's own limited visibility has shown that at least six organizations have been affected by the bugs — so by disclosing the issues, more organizations have a chance to protect against the threat, the security vendor said.

One of the zero-day vulnerabilities — a remote heap overflow bug in iOS 13.4/ 13.4.1 — is what ZecOps described as "zero-click" because it is remotely exploitable without any user interaction on devices running iOS 13 with the default Mail application open in the background.

Attackers can exploit the vulnerability by sending emails that consume a significant amount of memory on vulnerable devices, ZecOps said. The emails do not have to be especially large, but they need to be crafted so they consume a lot RAM. The other bug is a so-called out of bounds (OOB) write vulnerability that also can be exploited via a specially crafted email. With this bug, however, an iOS user would need to click on the email for the exploit to be executed.

Hard to Exploit
"The vulnerabilities are pretty severe, resulting in remote code execution," says Costin Raiu, director of the global research and analysis team at Kaspersky. "This is practically as bad as it gets." In particular, the bug affecting iOS 13 is severe because exploitation is a zero-click process, requiring no user interaction. "This means the attack can be almost invisible," Raiu says.

At the same time, attackers will have to work hard to exploit the bugs, he says. ZecOps itself has noted that its telemetry points to the attackers being part of a known nation-state group. It is likely the operator purchased the exploit from a third-party researcher as proof-of-concept code and then used it as-is with a few modifications, the vendor said.

"I would say that iOS exploitation in general is not an easy task," Raiu says. "Apple keeps trying to make iOS software and hardware more resistant to attacks, and this can be directly seen in the price of iOS exploits on platforms such as Zerodium," he notes.  

A full zero-click iOS exploit chain is worth about $2 million currently, he says. "Like in most cases, exploiting them is quite different from reliably exploiting them," Raiu adds.

According to ZecOps, when the bugs are exploited most iOS users are unlikely to notice much more than a slowdown of their default mobile mail app. In some cases, exploit attempts have resulted in the mail application crashing on iOS 12 devices. But iOS 13 users typically experience a barely noticeable mail app slowdown, ZecOps said. With failed attacks, users might see email with the alert "This message has no content" in it, the security vendor said.

ZecOps said its researchers had observed both the OOB bug and particularly the heap overflow issue being exploited in the wild. But it appears that the attackers initially might have at least triggered the OOB bug accidentally when trying to exploit the heap overflow issue.

"While ZecOps refrains from attributing these attacks to a specific threat actor, we are aware that at least one 'hackers-for-hire' organization is selling exploits using vulnerabilities that leverage email addresses as a main identifier," the vendor said.

Related Content:

Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's featured story: "Learning From the Honeypot: A Researcher and a Duplicitous Docker Image"

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/3/2020
'BootHole' Vulnerability Exposes Secure Boot Devices to Attack
Kelly Sheridan, Staff Editor, Dark Reading,  7/29/2020
Out-of-Date and Unsupported Cloud Workloads Continue as a Common Weakness
Robert Lemos, Contributing Writer,  7/28/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-19453
PUBLISHED: 2020-08-03
Wowza Streaming Engine through 2019-11-28 allows XSS (issue 1 of 2).
CVE-2019-19455
PUBLISHED: 2020-08-03
Wowza Streaming Engine through 2019-11-28 has Insecure Permissions.
CVE-2020-4560
PUBLISHED: 2020-08-03
IBM Financial Transaction Manager 3.2.4 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
CVE-2019-4589
PUBLISHED: 2020-08-03
IBM Cognos Analytics 11.0 and 11.1 is vulnerable to privlege escalation where the "My schedules and subscriptions" page is visible and accessible to a less privileged user. IBM X-Force ID: 167449.
CVE-2020-4328
PUBLISHED: 2020-08-03
IBM Financial Transaction Manager 3.2.4 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 177839.