Apple says iOS Mail vulnerabilities do not pose immediate threat, patch coming

Posted:
in iOS edited April 2020
Apple on Thursday responded to reports concerning the discovery of two zero-day vulnerabilities found in its Mail app for iOS, saying the unpatched flaws do not pose an immediate threat to users.

ZecOps


On Wednesday, security firm ZecOps published a report claiming the discovery of two previously unknown Mail vulnerabilities that, if exploited, allow attackers to remotely access, modify or delete user emails.

As detailed by ZecOps, attackers can exploit the iOS bug by sending specially crafted emails that trigger faults, enabling them to run remote code. While the attack requires a user to click on the malicious email in iOS 12, it becomes a zero-click, or unassisted, vector when Mail is opened in the background in iOS 13.

In existence since iOS 6, the flaws have been triggered in the wild as part of targeted attacks, including individuals from a Fortune 500 company, an executive in Japan, a VIP in Germany, managed security service providers in Saudi Arabia and Israel, and a European journalist, ZecOps said.

Apple on Thursday denied the severity of the situation in a statement to Bloomberg's Mark Gurman, who subsequently shared the company's official response in a tweet.
Apple take all reports of security threats seriously. We have thoroughly investigated the researcher's report and, based on the information provided, have concluded these issues do not pose an immediate risk to our users. The researcher identified three issues in Mail, but alone they are insufficient to bypass iPhone and iPad security protections, and we have found no evidence they were used against customers.
Apple went on to say it values input from independent security researchers who help make iOS safe and will in the future credit the person who discovered the vulnerability. The company typically issues a security update with each software release to detail patched bugs and identify the security researchers or research groups who discovered them.

According to ZecOps, Apple's latest iOS 13.4.5 beta release patches the reported vulnerabilities.

Comments

  • Reply 1 of 18
    Rayz2016Rayz2016 Posts: 6,957member
    So If Apple is saying that there is no immediate threat, then they’re also saying that this part:

    In existence since iOS 6, the flaws have been triggered in the wild as part of targeted attacks, including individuals from a Fortune 500 company, an executive in Japan, a VIP in Germany, managed security service providers in Saudi Arabia and Israel, and a European journalist, ZecOps said

    is false?

    Since this is the second time this bug has shown up, this will now be like a bandaged elbow on a WCW wrestler: somewhere to focus your attack, except that WCW wrestling is more of a pantomime than a sport, so a bandaged elbow isn’t really … anyway that metaphor’s dead in the water so let’s just leave it there. 
    MplsPcommand_fdarkvaderwatto_cobra
  • Reply 2 of 18
    digitoldigitol Posts: 276member
    Apple's response to this is pure baby caca! It is  super insulting how stupid Apple thinks its customers are. Shameful. #Weak #Lies #WetPaperBagSecurity #Shameful.
    darkvader
  • Reply 3 of 18
    tommy65tommy65 Posts: 56member
    Strange if you check Reuter’s. They say the following:” Apple on Wednesday acknowledged the vulnerability existed in its software for email on iPhones and iPads, known as the Mail app, and said the company had developed a fix that will be introduced in a forthcoming update to millions of devices it has sold globally”.

    Why would Apple patch this vulnerability if it doesn’t exists today?

    Link to source:
    https://www.reuters.com/article/apple-cyber-idUSL2N2CC04D
  • Reply 4 of 18
    sirlance99sirlance99 Posts: 1,293member
    Man, I love Apple but they always skirt around when they fuck up and NEVER admit to it. It’s always something with them and trying to miss direct. I’d like them a whole ton better if, when they fuck up, they’d just say they fucked it and say they are going to make it better. 
    muthuk_vanalingamMplsPchemengin1cgWerksdarkvader
  • Reply 5 of 18
    Rayz2016Rayz2016 Posts: 6,957member
    tommy65 said:
    Strange if you check Reuter’s. They say the following:” Apple on Wednesday acknowledged the vulnerability existed in its software for email on iPhones and iPads, known as the Mail app, and said the company had developed a fix that will be introduced in a forthcoming update to millions of devices it has sold globally”.

    Why would Apple patch this vulnerability if it doesn’t exists today?

    Link to source:
    https://www.reuters.com/article/apple-cyber-idUSL2N2CC04D
    Apple didn’t say there was no vulnerability. They said they found no evidence that the vulnerability had impacted users. 
    command_fwatto_cobra
  • Reply 6 of 18
    digitol said:
    Apple's response to this is pure baby caca! It is  super insulting how stupid Apple thinks its customers are. Shameful. #Weak #Lies #WetPaperBagSecurity #Shameful.
    This isn’t Twitter. Cut with the lame hashtags. 
    talexyjdb8167Bart Ybonobobrusswcommand_fwatto_cobra
  • Reply 7 of 18
    fred1fred1 Posts: 1,112member
    Have you or anyone you know been affected? Just curious. I found a strange e-mail in my junk folder on my iPhone last week and immediately deleted it without reading it. Could that have been one?
    darkvader
  • Reply 8 of 18
    Rayz2016Rayz2016 Posts: 6,957member
    fred1 said:
    Have you or anyone you know been affected? Just curious. I found a strange e-mail in my junk folder on my iPhone last week and immediately deleted it without reading it. Could that have been one?
    It could’ve been anything 🤷🏾‍♂️
    Bart Y
  • Reply 9 of 18
    MplsPMplsP Posts: 3,925member
    I agree with the other comments here - we have a known, zero-day vulnerability that has been seen in the wild and has now been publicized so it is widely known. I'm happy that Apple is issuing a patch but am dumbfounded how they can say there is no risk to users. I also wonder why they haven't fixed it yet since they have known about it since February. 
    cgWerksdarkvader
  • Reply 10 of 18
    lkrupplkrupp Posts: 10,557member
    Rayz2016 said:
    So If Apple is saying that there is no immediate threat, then they’re also saying that this part:

    In existence since iOS 6, the flaws have been triggered in the wild as part of targeted attacks, including individuals from a Fortune 500 company, an executive in Japan, a VIP in Germany, managed security service providers in Saudi Arabia and Israel, and a European journalist, ZecOps said

    is false?

    Since this is the second time this bug has shown up, this will now be like a bandaged elbow on a WCW wrestler: somewhere to focus your attack, except that WCW wrestling is more of a pantomime than a sport, so a bandaged elbow isn’t really … anyway that metaphor’s dead in the water so let’s just leave it there. 
    Hey troll! Professional wrestling is the only true sport left in America, period. All those other supposed ‘sports’ like baseball, basketball, hockey, football, tennis, are scripted and fake just like that reality show ‘Naked and Afraid’. How do I know this for a fact? Hulk Hogan told me and the Hulkster doesn’t lie to his Hulkamaniacs. So there.
    command_fjony0
  • Reply 11 of 18
    Rayz2016 said:
    tommy65 said:
    Strange if you check Reuter’s. They say the following:” Apple on Wednesday acknowledged the vulnerability existed in its software for email on iPhones and iPads, known as the Mail app, and said the company had developed a fix that will be introduced in a forthcoming update to millions of devices it has sold globally”.

    Why would Apple patch this vulnerability if it doesn’t exists today?

    Link to source:
    https://www.reuters.com/article/apple-cyber-idUSL2N2CC04D
    Apple didn’t say there was no vulnerability. They said they found no evidence that the vulnerability had impacted users. 

    tommy65 said:
    Agree but if I would hide chocolate Easter eggs and Apples and Pears cannot find any that does not mean there are none. What if someone else has found the Easter eggs but is keeping the eggs in their own basket without informing Apples and Pears. Apples and Pears might be eating chocolate without knowing they are.

    edited April 2020
  • Reply 12 of 18
    lkrupplkrupp Posts: 10,557member
    Why can’t we delete a post?
    edited April 2020
  • Reply 13 of 18
    As I understand it the Mail bugs by themselves are not enough to give a remote attacker control of the iPhone, enable them to install malware/spyware on it, etc. But, if combined with another exploit, likely a zero day kernel vulnerability, the attacker can then compromise the device. And it seems that there may be one or more zero day iOS kernel vulns out there that some attacker(s) are using, along with these Mail bugs, against specific targets — these are the "in the wild" attacks ZecOps came across and are talking about. The attacks are probably being conducted by nation state actors, think NSA, China, NK, Saudi Arabia, etc. Problem is ZecOps apparently don't know the details of the kernel vuln(s) these attacks used, just the Mail vulns that the attacks use to start the process, and Apple likely don't know the details of the other vulns either. Yet. So both parties are telling the truth, but only part of it — ZecOps have found targeted attacks on individuals that use these Mail vulns as part of the process, but all they could tell Apple the details of was the Mail bugs. And Apple are correctly stating that by themselves these Mail vulns are not sufficient to threaten iOS users security. What Apple don't want to admit publicly is that there may be one or more other, unknown, bugs out there that when combined with these Mail bugs do threaten users security. I guess it's even possible that the kernel vuln(s) the ZecOps attacks used have already been patched in a recent(ish) iOS update but were used against targets who had not installed the patched version for whatever reason (we've no idea when these victims were attacked, maybe before the patch was available?)
    command_f
  • Reply 14 of 18
    lkrupplkrupp Posts: 10,557member
    Rayz2016 said:
    So If Apple is saying that there is no immediate threat, then they’re also saying that this part:

    In existence since iOS 6, the flaws have been triggered in the wild as part of targeted attacks, including individuals from a Fortune 500 company, an executive in Japan, a VIP in Germany, managed security service providers in Saudi Arabia and Israel, and a European journalist, ZecOps said

    is false?

    Since this is the second time this bug has shown up, this will now be like a bandaged elbow on a WCW wrestler: somewhere to focus your attack, except that WCW wrestling is more of a pantomime than a sport, so a bandaged elbow isn’t really … anyway that metaphor’s dead in the water so let’s just leave it there. 
    Yes, Apple is saying that this ZecOps outfit is wrong, not about the existence of the vulnerabilities, but about whether they have actually been exploited. So who do you choose to believe?

    How about AppleInsider hire a security researcher to create one of these ‘specially crafted emails’ and test it. It should be easy to do now that the details have been released and the entire universe of hackers is actively exploiting the flaws as we speak? Even better, why doesn’t one of the myriad of security experts who call AI home do this as a service to the AI community? Then we’ll know who is lying, right?
    edited April 2020 watto_cobra
  • Reply 15 of 18
    It's probably a good idea to read the original release from ZecOps (https://blog.zecops.com/vulnerabilities/youve-got-0-click-mail/) or at least their FAQ for this (https://blog.zecops.com/vulnerabilities/youve-got-0-click-mail/#post-faq). They lay out their case for why they think there's been exploitation and also explain that this is, by itself, not enough to fully take over the phone. 

    Speaking as someone who works in IT security, I'm going to make two observations:

    1. Gaining control of an email account can have catastrophic consequences, both for the individuals and organizations. 

    2. Whenever some locally exploitable bug is reported on here, there is always a chorus of people who disclaim it based on the fact that you need access to the device or to be running software on the device in order to exploit it, and they only get their software from the App Store, or some such thing. This is the other half of the exploit chain that makes local vulnerabilities so dangerous; this is the kind of thing that makes local vulnerabilities into remote ones. 
    cgWerks
  • Reply 16 of 18
    command_fcommand_f Posts: 422member
    dshanah said:
    As I understand it the Mail bugs by themselves are not enough to give a remote attacker control of the iPhone, enable them to install malware/spyware on it, etc. But, if combined with another exploit, likely a zero day kernel vulnerability, the attacker can then compromise the device. And it seems that there may be one or more zero day iOS kernel vulns out there that some attacker(s) are using, along with these Mail bugs, against specific targets — these are the "in the wild" attacks ZecOps came across and are talking about. The attacks are probably being conducted by nation state actors, think NSA, China, NK, Saudi Arabia, etc. Problem is ZecOps apparently don't know the details of the kernel vuln(s) these attacks used, just the Mail vulns that the attacks use to start the process, and Apple likely don't know the details of the other vulns either. Yet. So both parties are telling the truth, but only part of it — ZecOps have found targeted attacks on individuals that use these Mail vulns as part of the process, but all they could tell Apple the details of was the Mail bugs. And Apple are correctly stating that by themselves these Mail vulns are not sufficient to threaten iOS users security. What Apple don't want to admit publicly is that there may be one or more other, unknown, bugs out there that when combined with these Mail bugs do threaten users security. I guess it's even possible that the kernel vuln(s) the ZecOps attacks used have already been patched in a recent(ish) iOS update but were used against targets who had not installed the patched version for whatever reason (we've no idea when these victims were attacked, maybe before the patch was available?)
    That's how I understand it too. The Mail issue allows code execution by the attacker, if that code is a kernel vulnerability then they're in.
  • Reply 17 of 18
    dysamoriadysamoria Posts: 3,430member
    Why does AI continue to post company statements without sign of quotation? No quotation marks, no quote formatting...
  • Reply 18 of 18
    tommy65tommy65 Posts: 56member
    lkrupp said:
    Rayz2016 said:
    So If Apple is saying that there is no immediate threat, then they’re also saying that this part:

    In existence since iOS 6, the flaws have been triggered in the wild as part of targeted attacks, including individuals from a Fortune 500 company, an executive in Japan, a VIP in Germany, managed security service providers in Saudi Arabia and Israel, and a European journalist, ZecOps said

    is false?

    Since this is the second time this bug has shown up, this will now be like a bandaged elbow on a WCW wrestler: somewhere to focus your attack, except that WCW wrestling is more of a pantomime than a sport, so a bandaged elbow isn’t really … anyway that metaphor’s dead in the water so let’s just leave it there. 
    Yes, Apple is saying that this ZecOps outfit is wrong, not about the existence of the vulnerabilities, but about whether they have actually been exploited. So who do you choose to believe?

    How about AppleInsider hire a security researcher to create one of these ‘specially crafted emails’ and test it. It should be easy to do now that the details have been released and the entire universe of hackers is actively exploiting the flaws as we speak? Even better, why doesn’t one of the myriad of security experts who call AI home do this as a service to the AI community? Then we’ll know who is lying, right? Yes 


    If user’s information is breached via mail does Apple care to investigate? I remember something similar from the past with another BIG corporate company. They said:” Not within the scope of our software...”.
     
Sign In or Register to comment.