Apple releases iOS 15.0.2 to fix two zero-day exploits; and fails to credit the researcher who found the vulnerability

Ashwin
Oct 14, 2021
Mobile Computing
|
9

Last month, Apple released an emergency update for its iPhones, iPads, Mac computers, and Apple Watches to fix a serious security vulnerability. It's happening again, two more zero-day vulnerabilities have been patched in iOS 15.0.2.

Apple releases iOS 15.0.2 to fix zero-day exploits; update your iPhone now

The update fixes an exploit with the tracking entry CVE-2021-30883. It fixes a security vulnerability related to the IOMobileFrameBuffer, that could allow execution of arbitraty code with kernel privileges. Apple says it has resolved the problem by improving the memory handling of devices.

The other vulnerability that was fixed is called Gamed O-day. It allowed apps installed from the App Store to access user data such as the Apple ID email and full name linked to it, the Apple ID authentication token, the file system which in turn allows access to SMS, Mail, iMessage, 3rd party messengers, and the user's interaction with the contacts, not limited to timestamps and attachments.

The iOS 15.0.2 and iPadOS 15.0.2 is available for iPhone 6s and later, iPad Pro (all models), iPad Air 2 and later, iPad 5th generation and later, iPad mini 4 and later, and iPod touch (7th generation).

There's a bit of a drama behind the iOS 15.0.2 Update. If you go to the Apple Security Update page for the latest patch, you may be surprised to find that the second security exploit that we mentioned above is not listed there. It almost looks like they wanted to keep it quiet, doesn't it? Well, that is exactly what happened.

Bleeping Computer reports that Apple did not credit the researcher who found the 2nd vulnerability. The exploit was discovered by Denis Tokarev, a Russian software developer. If you look back a few months, you may know that the Cupertino based company patched its operating system quite a few times to address security advisories. Tokarev assisted Apple by sharing his discoveries, and the company included a fix for the exploit that he reported in iOS 14.7, 15.0 (2 issues).  When he asked Apple to credit him for his findings, he was instead told to treat the email correspondence as confidential. This is highly unusual and unethical. The Apple Security Bounty Program exists for a reason, to reward security experts who help the company patch vulnerabilities, for their contribution to protect millions of users worldwide.

Apple Security Bounty

As a matter of fact, the page for the bounty program states that

Apple offers public recognition for those who submit valid reports, and will match donations of the bounty payment to qualifying charities

And yet, Tokarev was not credited for his findings. Speaking of which, the developer has a GitHub page where he outlines the technical information of the exploit, including a proof of concept.

I wonder what would happen if these white hat hackers become annoyed by such treatment, and stopped helping Apple? Imagine the chaos if the users had their email IDs, names, logs, had been leaked on the dark web. It could prove to be very costly, quite literally.

On a side note, the security vulnerability related to the IOMobileFrameBuffer, that was patched in iOS 15.0.2 has been released on GitHub. That's good news, because we can expect a new Jailbreak for it.

Summary
Apple patches two security vulnerabilities in iOS 15.0.2
Article Name
Apple patches two security vulnerabilities in iOS 15.0.2
Description
Apple fixes two zero-day exploits in the iOS 15.0.2 update. Patch your iPhone and iPad now to stay safe.
Author
Publisher
Ghacks Technology News
Logo
Advertisement

Tutorials & Tips


Previous Post: «
Next Post: «

Comments

  1. YooBeeEll said on October 16, 2021 at 10:28 am
    Reply

    Or, the researcher wishes to remain anonymous?

    1. Alfie said on October 16, 2021 at 1:39 pm
      Reply

      Posted publicly (see link in article above)
      https://github.com/illusionofchaos/ios-gamed-0day

      1. Tony said on October 17, 2021 at 9:01 pm
        Reply

        Interesting. From that page:

        “On the Apple Security Bounty Program page this vulnerability is evaluated at $100,000…”

  2. ULBoom said on October 14, 2021 at 6:32 pm
    Reply

    Of course, Apple sells snob appeal.

  3. ilev said on October 14, 2021 at 6:29 pm
    Reply

    Who said the the researcher was the first/only one who found the vulnerability ?
    Maybe someone else was the first ?

    1. Honorius said on October 15, 2021 at 10:24 am
      Reply

      Apple said. Apple sent this researcher an email confirming the vulnerability.
      The researcher has posted not only the details of the vulnerability, but also the correspondence with Apple.

      1. Alfie said on October 16, 2021 at 1:48 pm
        Reply

        Saw this comment on the GitHub page: Update: Apple has quietly fixed this in iOS 15.0.2 without any kind of public acknowledgement or credit.

        Did not see the Apple correspondence. Where did you find it?

    2. matthiew said on October 15, 2021 at 3:05 am
      Reply

      Who said that only the first researcher gets credit? Maybe Apple should credit everyone who’s work they use?

    3. Yash said on October 14, 2021 at 10:26 pm
      Reply

      Yep most probably someone else who didn’t contact Apple and exploited the vulnerability. But then researcher did his job for which he has been cast aside by Apple.

Leave a Reply

Check the box to consent to your data being stored in line with the guidelines set out in our privacy policy

We love comments and welcome thoughtful and civilized discussion. Rudeness and personal attacks will not be tolerated. Please stay on-topic.
Please note that your comment may not appear immediately after you post it.