iPhone Users Urged To Update Immediately
Google’s elite phone bug-hunting team has exposed six ‘interactionless’ security breaches in iPhones.
The flaws were patched in an update released by Apple last week but the hacks can still infiltrate phones running on the old operating system.
All the vulnerabilities, which required no user interaction, were responsibly reported to Apple by Samuel Groß and Natalie Silvanovich of Google Project Zero, which the company patched just last week with the release of the latest iOS 12.4 update.
The one omitted was because Apple’s iOS 12.4 patch didn’t completely resolve the flaw, according to Natalie Silvanovich, one of Google’s researchers.
Silvanovich says four of the six security bugs allow malicious code on iPhones with no user interaction needed.
Project Zero released findings and details of the flaws in a series of blog posts.
Apple has responded by releasing a new iOS patch which fixes five of the six bugs, with users urged to immediately install it.
Here below, you can find brief details, links to the security advisory, and PoC exploits for all four vulnerabilities:
- CVE-2019-8647 (RCE via iMessage) — This is a use-after-free vulnerability that resides in the Core Data framework of iOS that can cause arbitrary code execution due to insecure deserialization when NSArray initWithCoder method is used.
- CVE-2019-8662 (RCE via iMessage) — This flaw is also similar to the above use-after-free vulnerability and resides in the QuickLook component of iOS, which can also be triggered remotely via iMessage.
- CVE-2019-8660 (RCE via iMessage) — This is a memory corruption issue resides in Core Data framework and Siri component, which if exploited successfully, could allow remote attackers to cause unexpected application termination or arbitrary code execution.
- CVE-2019-8646 (File Read via iMessage) — This flaw, which also resides in the Siri and Core Data iOS components, could allow an attacker to read the content of files stored on iOS devices remotely without user interactions, as user mobile with no-sandbox.