<div style="margin:20px 0 0 200px"> To view the site, enable JavaScript by changing your browser options, then <a href="">Try Again</a>.</div>
14 Oct, 2020
New Bugs Reported In Apple Software

A team of five security researchers has worked and monitored the Apple online security services for 3 months (July to September), and found a total of 55 flaws. Out of these 55 flaws, 11 vulnerabilities are indicated as severe critical.

These vulnerabilities can result in bypassing the Apple security and access the iCloud account of the users. Moreover, the sensitive data of users such as photos, videos, contacts, calendar, and documents are in danger.

The 55 flaws are distinguished as:

  • Critical: 11
  • High severity: 29
  • Medium severity: 13
  • Low severity: 2

According to the sources, these vulnerabilities can:

"fully compromise both customer and employee applications, launch a worm capable of automatically taking over a victim's iCloud account, retrieve source code for internal Apple projects, fully compromise an industrial control warehouse software used by Apple, and take over the sessions of Apple employees with the capability of accessing management tools and sensitive resources."

The team of five members (Sam Curry, Brett Buerhaus, Ben Sadeghipour, Samuel Erb, and Tanner Barnes) has informed the Apple authorities about the flaws. To which, the makers have taken the necessary steps and fixed the flaws within 1-2 working days. So far, the company has patched 28 vulnerabilities with a payout of $288,500 as a bug bounty program.

Some of the critical bugs discovered by Sam Currey and team are:

  • Remote code execution (via Authorization and Authentication Bypass)
  • Remote code execution (via Leaked Secret and Exposed Administrator Tool)
  • Command injection (via Unsanitized Filename Argument)
  • Vertica SQL Injection (via Unsanitized Input Parameter)
  • Wormable stored XSS (to completely compromise the hacked iCloud account)
  • Blind XSS (to access Internal Support Portal for customer and employee issue tracking)

Sam Curry's thought on the program as noted in his blog post,
"When we first started this project we had no idea we'd spend a little bit over three months working towards its completion".
"This was originally meant to be a side project that we'd work on every once in a while, but with all of the extra free time with the pandemic we each ended up putting a few hundred hours into it."

Found this helpful?

Follow ISOEH (Indian School of Ethical Hacking) and stay updated with the cyber security news!

We are one of the trusted and responsible cyber security institutes in India. We provide a diverse range of cyber security courses viz; ethical hacking, ccna training, app development, diploma in software development, diploma in networking (offline and online).

For details, feel free to contact us at [email protected].

Stay digital, stay safe!

Read Other Breaking News

Read All Breaking News »

Exclusive Blog

Read All Exclusive Blog »
A few tips for the perfect homework
A few tips for the perfect homework

With world working from home, it's time to make it enjoyable and effective.

Read Details

Hacking Tools

Explore All Hacking Tools »
UFTP - UDP based FTP with encryption
UDP based FTP with encryption

UFTP is an encrypted multicast file transfer program for secure, reliable & efficient transfer of files. It also helps in data distribution over a satellite link.

Read Details