Google Researchers Say Hackers Exploited Two Zero-Day Vulnerabilities Patched in Apple's iOS 12.1.4 Update

Discussion in 'iOS Blog Discussion' started by MacRumors, Feb 8, 2019.

  1. MacRumors macrumors bot

    MacRumors

    Joined:
    Apr 12, 2001
    #1
    [​IMG]


    [​IMG]
    Two vulnerabilities that Apple patched in its latest iOS 12.1.4 update were successfully exploited by hackers before they were known to Apple, according to a top Google security engineer.

    Ben Hawkes, team leader at Google's Project Zero security research group, revealed in a tweet that vulnerabilities identified as CVE-2019-7286 and CVE-2019-7287 in Apple's iOS 12.1.4 security change log had been exploited in the wild as "zero day".

    A zero-day vulnerability refers to a security hole in software that is unknown to the software developer and the public, although it may already be known by attackers who are quietly exploiting it.

    As ZDNet notes, it's unclear under what circumstances the vulnerabilities were used, but one exploit involved the iOS Foundation component and a memory corruption issue that could allow an app to gain "elevated privileges" on an iPhone 5s and later, iPad Air and later, or iPod touch 6th generation. The second vulnerability potentially allowed for kernel privileges and affected the same devices.



    Apple credited "an anonymous researcher, Clement Lecigne of Google Threat Analysis Group, Ian Beer of Google Project Zero, and Samuel Groß of Google Project Zero" for discovering both vulnerabilities.

    Apple's iOS 12.1.4 update for the iPhone, iPad, and iPod touch, was principally designed to fix an insidious privacy-invading Group FaceTime bug discovered by a high school student that could be exploited to eavesdrop on conversations.


    Article Link: Google Researchers Say Hackers Exploited Two Zero-Day Vulnerabilities Patched in Apple's iOS 12.1.4 Update
     
  2. xxray macrumors 6502a

    Joined:
    Jul 27, 2013
    #2
    Wonder if this means the exploits are related to FaceTime again. Hopefully Apple fixes it ASAP.
     
  3. 69Mustang macrumors 603

    69Mustang

    Joined:
    Jan 7, 2014
    Location:
    In between a rock and a hard place
    #3
    Not related to FaceTime. Both were patched yesterday along with the FaceTime Bug. They were mentioned in yesterday's article. Just weren't credited or detailed. This article is just a follow up.
     
  4. ersan191 macrumors 65816

    Joined:
    Oct 26, 2013
    #4
    Apple’s security changelogs are like 50+% reported by project zero these days, kind of makes them look bad. Also makes you wonder how many unpatched vulnerabilities there are.
     
  5. Sasparilla macrumors 65816

    Joined:
    Jul 6, 2012
    #5
    Every hole in their OS's that Apple closes is a victory. It'd be better if these weren't being used as zero day's, but that is not the way real life in computer or smartphone OS's work (the bad guys are always finding some exploits to use / sell) - so good that Apple closed these as well. Keep it up Apple.
     
  6. 69Mustang macrumors 603

    69Mustang

    Joined:
    Jan 7, 2014
    Location:
    In between a rock and a hard place
    #6
    I don't think Apple looks bad at all. Project Zero is just good at what they do. I'm glad they are. As long as the exploits are found and fixed, generally speaking, I don't think anyone cares who found them. Apple would only look bad if they got news of an exploit, let it hit the 90 day window without action, and PZ disclosed. 'Til that happens...
     
  7. H3LL5P4WN macrumors 68000

    H3LL5P4WN

    Joined:
    Jun 19, 2010
    Location:
    Pittsburgh PA
    #7
    These jerks really need to start turning their bugs in to either Apple or Saurik instead of el Goog.
     
  8. genovelle macrumors 6502a

    Joined:
    May 8, 2008
    #8
    My problem is Google is focused on finding flaws in Apple products but major flaws in their own products go unnoticed and are found by outside groups and remain unpatched. In some cases Google has just stopped supporting the devices instead of fixing it.
     
  9. JosephAW macrumors 68000

    JosephAW

    Joined:
    May 14, 2012
    #9
    Yikes! I better update my iPhone 4S and iPhone 5 to the latest patch.
     
  10. 69Mustang macrumors 603

    69Mustang

    Joined:
    Jan 7, 2014
    Location:
    In between a rock and a hard place
    #10
    .
    Project Zero isn't focused on finding flaws in Apple products. That's just flat out lying.
     
  11. rjohnstone macrumors 68040

    rjohnstone

    Joined:
    Dec 28, 2007
    Location:
    PHX, AZ.
    #11
    Project Zero is run by Google, so...
     
  12. H3LL5P4WN macrumors 68000

    H3LL5P4WN

    Joined:
    Jun 19, 2010
    Location:
    Pittsburgh PA
    #12
    While I still stand by my statement, I think I misread the article as PZ picked up the vulns from elsewhere, not found them themselves.
     
  13. genovelle macrumors 6502a

    Joined:
    May 8, 2008
    #13
    I could not point out the flaw of your statement if it were not my focus at this point. If this was not a focus of this program then they would not be searching around there. The issue is they have massive holes in their own platform that others are finding and they take their sweet time fixing, if at all.

    Please provide me with the list of project zero exploits found in android and chrome that they made public in an article or even acknowledged. It sounds good, but not really
     
  14. Krizoitz macrumors 65816

    Krizoitz

    Joined:
    Apr 26, 2003
    Location:
    Tokyo, Japan
    #14
    So he claims they were exploited yet provides zero evidence or information. Well I’m convinced.
     
  15. webbuzz macrumors 65816

    webbuzz

    Joined:
    Jul 24, 2010
  16. Luke MacWalker macrumors member

    Joined:
    Jun 10, 2014
    #16
    If they know these vulnerabilities have been successfully exploited, would they care to tell us which apps were used for that? And any other information that could be interesting like… when did it start, an estimation of the number of people affected, what kind of information was targeted, was there any telltale sign (like app crashing). "it's unclear under what circumstances the vulnerabilities were used" is hardly useful in this regard.
     
  17. burgman macrumors 68000

    burgman

    Joined:
    Sep 24, 2013
    #17
    When the update dropped there were comments about I don't use facetime so I'm not going to install it for awhile. Seems the correct answer is install it now.
    --- Post Merged, Feb 8, 2019 ---
    This is a basically a PR article, all your answers are available at Google with some research.
     
  18. npmacuser5 macrumors 65816

    npmacuser5

    Joined:
    Apr 10, 2015
    #18
    Apple, Microsoft, and others could fix their OS’s to be 99% hacker proof. We however would not like the user experience. Given what the customers wants and needs are, the systems become a compromise between use and security. The jailbreaking times a perfect example of a tightly controlled system and what users demand. Push Pull.

    Three options:
    Accept the balance Apple systems provide
    Buy a secure device (they are out there)
    Chuck it and go off grid
     
  19. farewelwilliams macrumors 68000

    Joined:
    Jun 18, 2014
    #19
    looks like they’re trying to drive attention away from the Android expoit where an attacker can send a malicious PNG file to any Android 7.0 - 9.0 to take over the system
     
  20. seanoo macrumors newbie

    Joined:
    May 10, 2014
    #20
    Wasn’t iOS 12 supposed to reflect Apple taking a lap, focusing on stability and performance over new features? :confused::rolleyes:
     
  21. ghostface147 macrumors 68030

    ghostface147

    Joined:
    May 28, 2008
    #21
    17.
     
  22. mrex macrumors 68030

    mrex

    Joined:
    Jul 16, 2014
    Location:
    europe
    #22
    and google has batched it and notified android manufacturer months ago before releasing the information.

    if you phone hasnt batched, dont blame google, call to your android phone manufacturer, so there is no needs for google to ”drive attention” from exploit. google has fixed it.
     
  23. 69Mustang macrumors 603

    69Mustang

    Joined:
    Jan 7, 2014
    Location:
    In between a rock and a hard place
    #23
    https://9to5google.com/2018/01/03/google-project-zero-cpu-security-flaw-patches-android-chrome/
    https://www.zdnet.com/article/opening-this-image-file-grants-hackers-access-to-your-android-phone/
    https://www.androidpolice.com/2018/09/12/google-android-usb-security-flaw/
    https://searchsecurity.techtarget.com/answer/How-does-the-Android-Rowhammer-exploit-affect-users
    https://www.infosecurity-magazine.com/opinions/hacking-video-conferencing/

    The focus of Project Zero is to find zero day vulnerabilities. Regardless of OS. Info that readily accessible and easily found if your goal is anything but trying to throw dirt. You're pretty transparent in your willingness to ignore truth to push an agenda.

    If you have any intellectual curiosity, there's a national database: https://nvd.nist.gov/general You can search cleared vulnerabilities. Amazingly, they weren't all reported by Google.:rolleyes:
     
  24. luvbug macrumors regular

    luvbug

    Joined:
    Aug 11, 2017
    #24
    It says "iPhone 5s AND LATER".
     
  25. ikramerica macrumors 6502

    Joined:
    Apr 10, 2009
    #25
    I’m more interested in the vulnerability the saudis exploited where all they had to do was send a text to p0wn the iPhone of dissidents, a text you didn’t need to open, one without an attachment or bad link. I’ve heard very little about that other than the day it was revealed to have happened.
     

Share This Page