This article is more than 1 year old

Apple emergency patches fix zero-click iMessage bug used to inject NSO spyware

Separate flaw in WebKit also under attack squashed, too – and two zero-days in Chrome, as well

Updated Apple on Monday issued security patches for its mobile and desktop operating systems, and for its WebKit browser engine, to address two security flaws, at least one of which was, it is said, used by autocratic governments to spy on human rights advocates.

A day before the iGiant is expected to announce the iPhone 13, it released updates for iOS 14.8 and iPadOS 14.8, watchOS 7.6.2, and macOS Big Sur 11.6. Previous macOS releases Catalina (10.15) and Mojave (10.14) received updated versions of WebKit-based Safari (14.1.2), with Catalina also getting a supplemental fix.

One of the bugs, CVE-2021-30860, resides in Apple's CoreGraphics framework. Reported by researchers at University of Toronto's Citizen Lab, the bug consists of an integer overflow that allows a malicious PDF file to achieve arbitrary code execution, allowing spyware and other malicious programs to run.

Apple is aware of a report that this issue may have been actively exploited

"Apple is aware of a report that this issue may have been actively exploited," the biz said in its terse, non-committal summary.

Citizen Lab managed to be less coy in its assessment. On August 24, 2021, researchers with the organization reported that the iPhones of nine Bahraini activists had been hacked between June 2020 and February 2021 using NSO Group’s Pegasus spyware and two zero-click iMessage exploits.

One was the KISMET exploit identified last year, which affected iOS prior to version 14. The other more recently identified vulnerability is called FORCEDENTRY by Citizen Lab and Megalodon by Amnesty International's security group. The name FORCEDENTRY is a reference to the exploit's ability to bypass a defense Apple implemented in iOS 14 called Blast Door that was supposed to safeguard iMessage traffic. The messaging exploit is believed to have been in use since February 2021.

"When the FORCEDENTRY exploit was being fired at a device, the device logs showed crashes associated with IMTranscoderAgent," the Citizen Lab report explains. "The crashes appeared to be segfaults generated by invoking the copyGifFromPath:toDestinationPath:error function on files received via iMessage."

The crashes arose when using CoreGraphics to decode JBIG2-encoded data within a PDF file prepped to trigger the bug. When targeted activists received these poisoned PDF files – which had a .gif file extension but were in fact Adobe PDF files containing a JBIG2-encoded stream – no further action was required to infect the victim's device with malicious code: they simply had to receive the message. According to Citizen Lab, the FORCEDENTRY exploit, when successful, installed NSO Group's Pegasus spyware.

"Our latest discovery of yet another Apple zero day employed as part of NSO Group’s arsenal further illustrates that companies like NSO Group are facilitating 'despotism-as-a-service' for unaccountable government security agencies," Citizen Lab researchers said in a post on Monday. "Regulation of this growing, highly profitable, and harmful marketplace is desperately needed."

The other bug patched by Apple, CVE-2021-30858, was reported by an unidentified researcher. Dubbed "Synoptic Acanthopterygian" by Vulnonym, it's a use-after-free vulnerability that allows malicious web content processed by Apple's WebKit rendering engine – which Apple requires all browsers on iOS to use – to execute arbitrary code.

Apple said this flaw too may also be under active exploitation, though it provides no further detail.

The Register asked Apple to comment and the company, ever concerned that its customers should be well-informed, did not respond. ®

Updated to add

Not wanting to feel left out, maybe, Google today issued Chrome version 93.0.4577.82 for Windows, Mac, and Linux as a stable release, and it patches, among various bugs and holes, CVE-2021-30632 and CVE-2021-30633 – and exploits for the pair do exist in the wild.

CVE-2021-30632 is an out-of-bounds write in the V8 JavaScript engine, and CVE-2021-30633 is a use-after-free() hole in the Indexed DB API. Both are high in severity, and were credited to anonymous flaw finders. You probably want to install this as soon as you can.

More about

TIP US OFF

Send us news


Other stories you might like