▲ | sunrunner 4 days ago | |||||||||||||||||||||||||||||||||||||||||||
> Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals. Even if there was no mention of this or the implication that it’s linked to the notifications Apple sends for targeted attacks, is it fair to say this kind of backdated security patch implies a lot about the severity of the vulnerability? What’s Apple’s default time frame for security support? | ||||||||||||||||||||||||||||||||||||||||||||
▲ | bri3d 4 days ago | parent | next [-] | |||||||||||||||||||||||||||||||||||||||||||
Yes, this means it was exploited in a spyware campaign in the wild. The full exploit chain seems to target WhatsApp directly using a second bug in WhatsApp; although this vulnerability is definitely present anywhere this kind of image is processed using Apple’s native image support, it would usually be aggressively sandboxed (in iMessage by BlastDoor and in Safari by the web content sandbox), so you’d need a lot more vulnerabilities than those that are currently disclosed to make it useful in those places. A bug in WhatsApp itself is particularly bad in terms of spyware actors, since it leaves one of their most popular targets, WhatsApp, vulnerable without a significantly more complex kernel escalation and sandbox bypass. | ||||||||||||||||||||||||||||||||||||||||||||
▲ | giancarlostoro 4 days ago | parent | prev | next [-] | |||||||||||||||||||||||||||||||||||||||||||
One key thing I noticed is this is before iPadOS was a thing, so this patch targets iPads too... Which makes me wonder... this is speculation no proof, but I wonder if someone is exploiting Point of Sale devices that are powered by old iPads somehow, which is out of the control of a lot of end-users who are at thee mercy of the POS vendors who are probably charging an insane premium on them. I worked at a restaurant chain and I remember it being a whole thing to even consider reworking the POS tables + software due to rising costs. | ||||||||||||||||||||||||||||||||||||||||||||
| ||||||||||||||||||||||||||||||||||||||||||||
▲ | sfilmeyer 4 days ago | parent | prev | next [-] | |||||||||||||||||||||||||||||||||||||||||||
> What’s Apple’s default time frame for security support? This isn't thaaaaat far out of support. Their last security update for iOS 15 was just earlier this year, and they only dropped iPhone 6s from new major versions with iOS 16 a few years ago. As someone who has kept my last few iPhones for 5+ years each, I definitely appreciate that they keep a much longer support window than most folks on the Android side of things. | ||||||||||||||||||||||||||||||||||||||||||||
| ||||||||||||||||||||||||||||||||||||||||||||
▲ | duxup 4 days ago | parent | prev | next [-] | |||||||||||||||||||||||||||||||||||||||||||
> is it fair to say this kind of backdated security patch implies a lot about the severity of the vulnerability? That is my assumption, that the result is a pretty severe impact and/or the victim has little to no way to prevent it (zero click situation). Granted I can't speak for Apple, but I was thinking along the same lines you were. | ||||||||||||||||||||||||||||||||||||||||||||
▲ | altairprime 4 days ago | parent | prev | next [-] | |||||||||||||||||||||||||||||||||||||||||||
No specific timeframe is defined, but they tend to release things that matter really far back — like, the Apple CA certificate expiration update went out a few years ago to basically the entire deployed Square terminal iPad userbase, etc. I expect it’s driven by telemetry and threat model both. Presumably the cutoff is wherever the telemetry ceases! | ||||||||||||||||||||||||||||||||||||||||||||
▲ | zomiaen 4 days ago | parent | prev | next [-] | |||||||||||||||||||||||||||||||||||||||||||
Almost certainly some kind of zero click/zero user action RCE exploit. Edit: I should've read, "Impact: Processing a malicious image file may result in memory corruption." So simply receiving an image via SMS or loading it in some other way likely accomplishes the initial exploit, so yeah, zero click exploit. Always bad. | ||||||||||||||||||||||||||||||||||||||||||||
▲ | al_borland 4 days ago | parent | prev [-] | |||||||||||||||||||||||||||||||||||||||||||
I think their minimum standard is 5 years after they stop selling a product. However, it could go longer if things still work. The 6S was discontinued in 2018, which would give it support until at least 2023, so we aren’t too far beyond that. |