{"id":2435,"date":"2022-08-26T21:39:15","date_gmt":"2022-08-26T16:39:15","guid":{"rendered":"https:\/\/testing.dicecamp.com\/insights\/?p=2435"},"modified":"2022-09-08T17:50:21","modified_gmt":"2022-09-08T12:50:21","slug":"a-cybersecurity-view-of-apples-zero-day-security-flaw","status":"publish","type":"post","link":"https:\/\/testing.dicecamp.com\/insights\/a-cybersecurity-view-of-apples-zero-day-security-flaw\/","title":{"rendered":"A Cybersecurity View of Apple\u2019s Zero-Day flaws"},"content":{"rendered":"\n<p>Just last week, Apple released a series of <strong>emergency security updates<\/strong> as a response to two zero-day vulnerabilities found in iPhone, Mac, and iPad devices.<\/p>\n\n\n\n<p>Though the news surfaced at Apple\u2019s <a href=\"https:\/\/support.apple.com\/en-us\/HT213413\" target=\"_blank\" rel=\"noreferrer noopener\">official website<\/a>, it however lacked important details on the possible exploitation of the vulnerabilities.<\/p>\n\n\n\n<p>The hackers would have \u201cactively exploited\u201d the security loopholes, mentioned Apple.&nbsp;<\/p>\n\n\n\n<p>To address the sensitivity of the matter, various cybersecurity agencies and specialists around the globe helped iOS users discern the potential impacts and security measures.&nbsp;<\/p>\n\n\n\n<p>Although Apple hasn\u2019t disclosed how, and when it got to the vulnerability, the iPhone maker cited an \u201canonymous researcher\u201d working as an <strong>ethical hacker <\/strong>in favor of the company.&nbsp;<\/p>\n\n\n\n<p>The two bugs identified by the <strong>penetration test<\/strong> (aka pen test) are dubbed as \u201c<strong>out of bounds<\/strong>\u201d write flaws. <\/p>\n\n\n\n<p>Each resides in the Kernel and in the Webkit engine respectively, offering hackers two easy ways to jump in, and control an iDevice.&nbsp;<\/p>\n\n\n\n<p><strong>Vulnerable devices<\/strong> include:&nbsp; iPhones dating back to the 6S model, iPad 5th generation and later, iPad Air 2 and later, iPad mini 4 and later, all iPad Pro models and the 7th generation iPod touch.<\/p>\n\n\n\n<p>The tech giant says new<strong> updates<\/strong> offer better \u201c<strong>control of bounds<\/strong>\u201d in the system, and that hackers would no longer exploit devices after the updates are installed.<\/p>\n\n\n\n<p>Before we jump to the vulnerability details make sure you\u2019ve updated your iPhone, Mac, iPad, and iPod systems to the latest security updates, as the updates are recommended to be installed urgently, for all users.&nbsp;<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">About the Vulnerabilities<\/h1>\n\n\n\n<p>Apple identified the two security vulnerabilities as <strong>out of bounds <\/strong>write flaws.&nbsp;<\/p>\n\n\n\n<p>Simply put, an out of bounds write flaw lets an application write a program outside its allocated memory resources potentially getting unauthorized access to other programs.&nbsp;<\/p>\n\n\n\n<p>Such a bug impacts the application controls in two ways. Either the app crashes, or more dangerously, gets to write arbitrary code remotely.<\/p>\n\n\n\n<p>This is done following a phenomenon known as <strong>Arbitrary Code Execution (ACE)<\/strong>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">1: The Webkit Zero-day<\/h2>\n\n\n\n<p>Denoted as <strong>CVE-2022-32893<\/strong>, this vulnerability was found in the Safari web engine: \u201cWebkit\u201d.<\/p>\n\n\n\n<p>A hacker could exploit this security flaw to execute a malicious arbitrary code essentially through a website.&nbsp;<\/p>\n\n\n\n<p>Quite troublesome, the impacts are not just limited to Safari Web Browsing functionalities as we explain shortly in the article.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">2: The Kernel Zero-day<\/h2>\n\n\n\n<p>The other vulnerability, denoted as <strong>CVE-2022-32894<\/strong>, affects the Kernel of the iOS.&nbsp;<\/p>\n\n\n\n<p>For a one-liner overview, the kernel of an operating system is that part of the code that is tasked for resource allocation. <\/p>\n\n\n\n<p>This includes for example assigning memory, and processing resources to other components in the system.<\/p>\n\n\n\n<p>Thus the kernel has <strong>direct access <\/strong>to all the applications and hardware of the system.&nbsp;<\/p>\n\n\n\n<p>With this kernel-hit security flaw, a hacker can use a malicious application to run an arbitrary code (ACE) with kernel privileges, getting <strong>unrestricted access<\/strong> to all the applications in the device as well as the hardware components.<\/p>\n\n\n\n<p>In the following section we explain in how many ways hackers could use the above vulnerabilities to control a device remotely.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Expert\u2019s Views on the impact of Vulnerabilities<\/h1>\n\n\n\n<p>At the Sophos\u2019 official <a href=\"https:\/\/nakedsecurity.sophos.com\/2022\/08\/18\/apple-patches-double-zero-day-in-browser-and-kernel-update-now\/\" target=\"_blank\" rel=\"noreferrer noopener\">blog<\/a> page, Paul Duckline, a cybersecurity expert, comes forward with his view on the potential impacts of the zero day bugs. These are presented as follows.<\/p>\n\n\n\n<p>First, it\u2019s surprising to know that the Webkit vulnerability can provide access to all HTML based applications and functionalities in the device.&nbsp;<\/p>\n\n\n\n<p>Therefore, the Webkit vulnerability caused a risk to \u2018all\u2019 the web-rendering applications of the device and not just the Safari exclusive content.&nbsp;<\/p>\n\n\n\n<p>You must know that the Webkit engine sits behind all the HTML functionalities in an iOS device, even behind those apps that display \u201cAbout Us\u201d and \u201cHelp\u201d pages using HTML\u2019s convenience.<\/p>\n\n\n\n<p>Since Apple has made it compulsory for all apps on the App Store to base their web functionalities on Webkit engine, a malicious web page containing an ACE, implanted by a hacker, could get a foothold on all the apps.<\/p>\n\n\n\n<p>The <strong>second vulnerability<\/strong> is more shocking and dangerous in impact since it resided at the kernel level.&nbsp;<\/p>\n\n\n\n<p>The Kernel privilege loophole can give a cybercriminal full control of your iDevice, something that\u2019s only reserved for Apple.<\/p>\n\n\n\n<p>Simply put, if a hacker got successful in implementing an ACE exploiting this bug, they can do the following to your iDevice:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Spying on any of the current running apps<\/strong><\/li><li><strong>Anonymously downloading and starting new apps on its own&nbsp;<\/strong><\/li><li><strong>Acquiring full access to data on the device<\/strong><\/li><li><strong>Changing system security settings<\/strong><\/li><li><strong>Retrieving location information<\/strong><\/li><li><strong>Taking screenshots<\/strong><\/li><li><strong>Using the cameras in the device<\/strong><\/li><li><strong>Turning on microphone<\/strong><\/li><li><strong>Copying text messages<\/strong><\/li><li><strong>Tracking web browsing<\/strong><\/li><\/ul>\n\n\n\n<p>And these are just some of the many privileges offered to a hacker by Apple\u2019s Kernel vulnerability.<\/p>\n\n\n\n<p>Additionally, a hacker is also to fool Apple\u2019s security controls by setting a spyware at the background of your device, arranging a comprehensive surveillance system, writes Paul.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">What to do?<\/h1>\n\n\n\n<p>First and foremost, users are advised to stay calm since fortunately there are no reported cases of \u201cany mass exploitation\u201d in this regard, states BBC.&nbsp;<\/p>\n\n\n\n<p>To keep yourself in the safe zone, it\u2019s urgently recommended to <strong>patch immediately<\/strong>.&nbsp;<\/p>\n\n\n\n<p>Here\u2019s how you can quickly and easily <a href=\"https:\/\/support.apple.com\/en-us\/HT204204\" target=\"_blank\" rel=\"noreferrer noopener\">install updates<\/a> on your iOS devices.<\/p>\n\n\n\n<p>Second, if you think you have been a victim of a cyber attack, a <strong>Device Firmware Update (DFU)<\/strong> would clean all the data on your device and reinstall the operating system from scratch.&nbsp;<\/p>\n\n\n\n<p>Please note that all your personal data will be lost in the case you perform a DFU, so it better needs a backup. <\/p>\n\n\n\n<p>However, due to the kind of vulnerabilities, backing up any HTML rendered files is not recommended.<\/p>\n\n\n\n<p>Read more about <a href=\"https:\/\/www.businessinsider.com\/guides\/tech\/dfu-mode#:~:text=What%20is%20DFU%20mode%3F,Recovery%20Mode%20on%20a%20Mac.\" target=\"_blank\" rel=\"noreferrer noopener\">DFU here.<\/a><\/p>\n\n\n\n<h1 class=\"wp-block-heading\">An Opportunity to Learn Ethical Hacking!<\/h1>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"286\" height=\"180\" src=\"https:\/\/testing.dicecamp.com\/insights\/wp-content\/uploads\/2022\/08\/dice-logo.png\" alt=\"\" class=\"wp-image-2454\" srcset=\"https:\/\/testing.dicecamp.com\/insights\/wp-content\/uploads\/2022\/08\/dice-logo.png 286w, https:\/\/testing.dicecamp.com\/insights\/wp-content\/uploads\/2022\/08\/dice-logo-150x94.png 150w\" sizes=\"auto, (max-width: 286px) 100vw, 286px\" \/><\/figure>\n<\/div>\n\n\n<p><a href=\"https:\/\/diceanalytics.pk\/\" target=\"_blank\" rel=\"noreferrer noopener\">Dice Analytics<\/a> brings an opportunity to learn <strong>Cybersecurity and Ethical Hacking<\/strong> in just 8 weeks. The course is presented in collaboration with an internationally acclaimed Senior Cybersecurity Specialist <a href=\"https:\/\/www.linkedin.com\/in\/jahanzaibawan\/\">Jahanzaib Awan<\/a>.\u00a0<\/p>\n\n\n\n<p>With 70% practical and 30% theory, this <strong>hands-on intensive<\/strong> course takes you through all the cybersecurity critical concepts to pull off the Certified Ethical Hacker (CEH) exam.<\/p>\n\n\n\n<p><em>CEH is currently the most recognized certification in the information security landscape.<\/em><\/p>\n\n\n\n<p><strong>What will you learn?<\/strong><\/p>\n\n\n\n<p>The course covers all ethical hacking concepts covering the CEH criteria. View <a href=\"https:\/\/diceanalytics.pk\/school\/courses-and-workshops\/cybersecurity-and-ethical-hacking\/?utm_source=LinkedIn&amp;utm_medium=Organic&amp;utm_campaign=Cybersecurity%2001#view-ds-content\" target=\"_blank\" rel=\"noreferrer noopener\">course outline and other details<\/a> here.<\/p>\n\n\n\n<p><em>Dice Analytics offers flexible pricing as well as valuable concessions.\u00a0<\/em><\/p>\n\n\n\n<p>Visit <a href=\"https:\/\/diceanalytics.pk\/school\/courses-and-workshops\/cybersecurity-and-ethical-hacking\/\" target=\"_blank\" rel=\"noreferrer noopener\">our page<\/a> for more information about the course.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>An ethical hacker finds two zero-day vulnerabilities in Apple software. Now fixed, are users still under threat? And in how many ways a hacker could exploit a zero day? Find out here!<\/p>\n","protected":false},"author":7,"featured_media":2437,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[28],"class_list":{"0":"post-2435","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-security","8":"tag-articles"},"_links":{"self":[{"href":"https:\/\/testing.dicecamp.com\/insights\/wp-json\/wp\/v2\/posts\/2435","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/testing.dicecamp.com\/insights\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/testing.dicecamp.com\/insights\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/testing.dicecamp.com\/insights\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/testing.dicecamp.com\/insights\/wp-json\/wp\/v2\/comments?post=2435"}],"version-history":[{"count":26,"href":"https:\/\/testing.dicecamp.com\/insights\/wp-json\/wp\/v2\/posts\/2435\/revisions"}],"predecessor-version":[{"id":2588,"href":"https:\/\/testing.dicecamp.com\/insights\/wp-json\/wp\/v2\/posts\/2435\/revisions\/2588"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/testing.dicecamp.com\/insights\/wp-json\/wp\/v2\/media\/2437"}],"wp:attachment":[{"href":"https:\/\/testing.dicecamp.com\/insights\/wp-json\/wp\/v2\/media?parent=2435"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/testing.dicecamp.com\/insights\/wp-json\/wp\/v2\/categories?post=2435"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/testing.dicecamp.com\/insights\/wp-json\/wp\/v2\/tags?post=2435"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}