• TekMol 10 months ago

    The article sounds like it also applies to iOS

        The company urged users across the Apple
        ecosystem to apply the urgent iOS 18.1.1,
        macOS Sequoia 15.1.1 and the older iOS 17.7.2.
    
    And that it is web based

        maliciously crafted web content may lead
        to arbitrary code execution
    
    Has this happened before? That iPhones had a security hole that could be exploited over the web?
    • e28eta 10 months ago

      Absolutely. I don’t follow the scene, but early in the iphone’s product life I distinctly remember a web-based jailbreak, where you loaded a page and then you could ‘slide to jailbreak’. I don’t know if user action was strictly required, or if it was a UX thing.

      • TekMol 10 months ago

        Shouldn't that lead to a massive amount of iPhones being broken into?

        If not, why?

        If so, what happened to all those phones?

        I never hear stories like "My iPhone was broken into and this happened: ..."

        • phillypham 10 months ago

          It used to be possible to break into iPhones by sending just a text message without the target clicking on anything.

          The only thing that kept this under control was there was an agreement to not target US-based numbers and the exploit was expensive.

          Reference: The Battle for the World’s Most Powerful Cyberweapon https://www.nytimes.com/2022/01/28/magazine/nso-group-israel... and https://en.wikipedia.org/wiki/Pegasus_(spyware)

          • pwagland 10 months ago

            Not quite, from the Wikipedia:

            > Pegasus' iOS exploitation was identified in August 2016. Emirati human rights defender Ahmed Mansoor received a text message promising "secrets" about torture happening in prisons in the United Arab Emirates by following a link. Mansoor sent the link to Citizen Lab of the University of Toronto, which investigated, with the collaboration of Lookout, finding that if Mansoor had followed the link it would have jailbroken his phone and implanted the spyware into it, in a form of social engineering.

            So the link was sent via text message, but you had to click on it. Receiving the text message did nothing in and of itself.

        • TheDong 10 months ago

          Why would it?

          Do you regularly visit "hot-iphone-porn-apps.info" and other untrusted sites? Do you expect sites you do visit, like "google.com" or such, are going to serve up malware?

          Do you expect hackers who build these very labor-intensive exploit chains will want to try and hit as many low-value targets as possible, leading to apple patching the exploit quickly, or to try and hit high-value targets only so it's not noticed by apple as quickly and can be used against more high-value targets to make more money in total than doing a "spray and pray" with it?

          What thought process do you think would lead to using the exploit against as many people as possible vs selling it to zerodium.com or a similar company for more money than you can get from spraying, and then zerodium reselling it to israel to hack into the iphones of a few key palestinians?

          • ceejayoz 10 months ago

            > Do you expect sites you do visit, like "google.com" or such, are going to serve up malware?

            Absolutely. One of the main reasons to run an adblocker. Malicious ads slip through regularly onto entirely reputable sites.

            • acdha 10 months ago

              > Do you expect sites you do visit, like "google.com" or such, are going to serve up malware?

              With absolute certainty. Google ads has triggered downloads of Windows executables on NYtimes.com for me before and I am confident attackers will keep trying. The idea that advertisers get to run JavaScript on clients makes that problem effectively unwinnable even though they spend considerable amounts trying to make it hard to slip dodgy code into ads.

              • TekMol 10 months ago

                You are implying that the web based exploits in the history of iOS were not publicly known but only available to very few.

                If that holds true, that would be an importent addition to the discussion.

                The comment I replied to was about a public website that could jailbreak an iPhone though.

              • throwaway290 10 months ago

                How are you sure your phone was not broken into? Do you think some big alert magically appears?

                • pwagland 10 months ago

                  Because most people apply the software updates at some point, and this was fixed many years ago. Everything sold in the last years comes with a version of iOS that isn't vulnerable anymore.

                  • hulitu 10 months ago

                    > Everything sold in the last years comes with a version of iOS that isn't vulnerable anymore.

                    Famous last words. (as far as i know they don't release just security patches for iOS, iOS patches introduce also new features, thus increasing the probability of new bugs).

                    My impression is that Apple fixes the majority of zero days _after_ they become public.

              • iknowstuff 10 months ago
                • hyder_m29 10 months ago

                  I'm assuming we don't click that link if we're on iPhones?

                  • imp0cat 10 months ago

                        This site is very old by now and does not support recent firmware, but you can still use it.
                    
                        JailbreakMe is the easiest way to free your device. Experience iOS as it could be, fully customizable, themeable, and with every tweak you could possibly imagine.
                    
                        Safe and completely reversible (just restore in iTunes), jailbreaking gives you control over the device you own. It only takes a minute or two, and as always, it's completely free.
                    
                        Please make an iTunes backup before jailbreaking.
                • kafrofrite 10 months ago

                  > Has this happened before? That iPhones had a security hole that could be exploited over the web? Yes, there were exploits in the past that could be exploited remotely, including some that were used for jailbreaking.

                  • hutattedonmyarm 10 months ago

                    > Has this happened before? That iPhones had a security hole that could be exploited over the web?

                    IIRC yes. Back around maybe iOS 4-6ish a web-based jailbreak existed, don't remember exactly when

                    • ThePowerOfFuet 10 months ago

                      Sounds like those who don't use Safari on macOS are less exposed.

                    • acdha 10 months ago

                      Interesting that they’re mentioned as only being exploited on Intel. Has anyone seen whether that’s because the attacker only targeted that platform or is it actually stopped by something like pointer protection?

                      • justinclift 10 months ago

                        Doesn't seem to completely line up that they're rushing out iOS updates (ie for phones, etc) for something they're saying they've only confirmed on Intel cpus.

                        Unless they're assuming it's exploitable on Apple Silicon as well, or are being extra careful just in case.

                        • bigiain 10 months ago

                          > Apple is aware of a report that this issue may have been actively exploited on Intel-based Mac systems.

                          Is kinda weasel-wordy, if you read it with sufficient cynicism.

                          Its doesn't rule out them also being aware of reports (or actual instances) of it being exploited on iOS or Apple silicon Macs.

                          It _might_ actually mean "Apple could not deny in a lawsuit that it's been sent a report of this being exploited on Intel Macs."

                          • duxup 10 months ago

                            Or they’re just not able to confirm it everywhere but feel the code change is necessary regardless?

                            I’ve certainly addressed a potential issue with code that I thought might have occurred even when I couldn’t confirm it with 100% certainty.

                            A detailed analysis / testing and confirmation that provides certainty may take longer than addressing code.

                            • kafrofrite 10 months ago

                              Most probably what Apple means is that since their codebase is shared, the vulnerability exists across devices. This does not mean that the vulnerability is actively exploited in iOS nor that it will not be actively exploited as part of some other campaign.

                              • brookst 10 months ago

                                If you read it with enough cynicism, it doesn’t rule out Apple having actual knowledge that it was exploited to steal every last bit of information from every Mac, iPhone, iPad, iPod, Apple TV, and Apple II ever produced.

                              • saagarjha 10 months ago

                                This just means the bug is in WebKit and they shipped the fix to every platform.

                                • initplus 10 months ago

                                  Will be an underlying safety issue in some system library, but they have only seen "in the wild" exploits targeting Intel. "Defence in depth" - better to push the bugfix to all than to scrutinize ARM security features to understand if an exploit is possible there as well.

                                  • oddevan 10 months ago

                                    > Unless they're... being extra careful just in case.

                                    That's where my money is.

                                    • ajross 10 months ago

                                      Or they just don't know. Full analysis of an exploit usually takes days to weeks. It's possible it's only exploitable on x86, but equally possible that only the x86 version of the payload was discovered in the wild.

                                      • 486sx33 10 months ago

                                        Rosetta2 runs an x86 exploit? Doesn’t explain iOS but still sounds interesting!

                                        • undefined 10 months ago
                                          [deleted]
                                      • ruthmarx 10 months ago

                                        Why? Putting a lot of stock in Apple's various protections?

                                      • tedunangst 10 months ago

                                        It's not unheard of for exploits to target two or more bugs.

                                        • SoftTalker 10 months ago

                                          Sometimes problems manifest differently on different architectures. It's one of the advantages of building for more than just one: it shakes out bugs. Doesn't mean you don't fix the root issue in all builds.

                                          Apple for the most part has one codebase that they build for their different architectures. They've been doing this since the NeXT days when they supported Motorola, Intel, Sparc, and maybe a couple of other architectures.

                                          • 2muchcoffeeman 10 months ago

                                            There must be millions of Intel Macs still around. Why wouldn’t they update it?

                                            • shepherdjerred 10 months ago

                                              The parent comment said that Apple is rushing iOS updates. iOS is the operating system for iPhones which use Apple Silicon rather than Intel processors.

                                              • wannacboatmovie 10 months ago

                                                Well for starters, they stopped providing any updates for many perfectly functional Intel Macs years ago for no other reason than planned obsolescence. A side effect of the "they make both the hardware and software that's why it's better" paradigm.

                                                Things like OpenCore Legacy Patcher prove it's possible; they just don't want to.

                                                I don't think anyone feels entitled to new features in perpetuity. Security updates only would be fine thank you.

                                                Don't tell me the richest company in the world can't pay for a couple of developers who just want to rest and vest to take care of and test the legacy platforms. A cushy job and you keep the customers happy.

                                                Ironically the best way to stay safe on these computers is to install Windows or Linux.

                                                • StressedDev 10 months ago

                                                  Software needs longer support life cycles in general. I find it frustrating that organizations do not support operating systems, hardware, and applications for at least 10 years. Note Apple is one of the better organizations on this. Consumer router companies are notorious for shipping unpatched software. Here is what I would like to see:

                                                  1. All hardware and software should come with a highly visible end of support date.

                                                  2. All hardware and software should notify people when it is no longer receiving security patches. It should also explain to users why running unpatched software or hardware is dangerous.

                                                  • pjmlp 10 months ago

                                                    Which is why having cybersecurity laws and liability in computing is so relevant.

                                                    • wannacboatmovie 10 months ago

                                                      To my knowledge Apple has never published EOL or support dates in the future. Someone correct me if something has changed in the last few years.

                                                      • wtallis 10 months ago

                                                        https://support.apple.com/en-us/102772 outlines "vintage" and "obsolete" status for hardware products, with a few exceptions. I'm not aware of a similarly straightforward criteria or comprehensive list for software support periods.

                                                        • danieldk 10 months ago

                                                          Samsung nowadays tells you ahead of time how long a phone will get major updates and security updates. I think it's the same with Google Pixel. And they have a list of models and their release schedules:

                                                          https://security.samsungmobile.com/workScope.smsb

                                                          My qualm with them is though that not all devices are updated at the same time (like iOS/iPadOS/macOS). One phone may get an update the 10th of the month, while another only gets it the 30th. As a result, there is often quite a large window where vulnerabilities are known, but not yet patched (it's even worse with the cheap models that only get quarterly updates).

                                                          • philistine 10 months ago

                                                            That list relates strictly to hardware repairs. Vintage macs have often been fully supported software-wise.

                                                            • wtallis 10 months ago

                                                              Yes, I'm fully aware that the support article I linked to is specifically about hardware support—that's why I mentioned that there isn't a similar list for software support.

                                                            • wannacboatmovie 10 months ago

                                                              The issue with passing off a list of vintage products as some kind of past tense support schedule is by definition products become vintage when they are added to the list at some arbitrary date.

                                                              My expectation is a table of OS versions and EOL dates published in advance. Like nearly every other responsible OS vendor in existence. Apple continuing to get a pass on this in 2024 is abhorrent.

                                                              • wtallis 10 months ago

                                                                > The issue with passing off a list of vintage products as some kind of past tense support schedule is by definition products become vintage when they are added to the list at some arbitrary date.

                                                                If you read some of the text above the product list, you'll see that Apple does publish guidelines about when products can be expected to be added to the list:

                                                                > Products are considered vintage when Apple stopped distributing them for sale more than 5 and less than 7 years ago.

                                                                > Products are considered obsolete when Apple stopped distributing them for sale more than 7 years ago. Monster-branded Beats products are considered obsolete regardless of when they were purchased.

                                                                > Apple discontinues all hardware service for obsolete products, and service providers cannot order parts for obsolete products. Mac laptops may be eligible for an extended battery-only repair period for up to 10 years from when the product was last distributed for sale, subject to parts availability.

                                                                So as you can see, it's not arbitrary or unpredictable when a product is going to show up on the vintage product list. The only unpredictable or obscure part of this process is finding out how long an outdated product was still being sold after its successor launched.

                                                                • wannacboatmovie 10 months ago

                                                                  Ok, but this is an Apples vs oranges comparison. (Carlos!)

                                                                  We are talking about software support here.

                                                                  The vintage products list is specifically targeting hardware support; e.g. how long Apple will keep spare parts in stock. After a set number of years they purge stock and you are SOL going to Chinese third party vendors and places like iFixit for batteries etc.

                                                                  • vetinari 10 months ago

                                                                    Not really; vintage macs turning obsolete are being dropped from the macOS support very reliably. I.e. the 2015 mbp was dropped from 2022 macos release like on the clock.

                                                        • threeseed 10 months ago

                                                          Sequoia is supported on most Intel Macs going back to 2018.

                                                          And it's far more than just a "couple of developers" to support older operating systems.

                                                          • brian_cunnie 10 months ago

                                                            Agreed. It takes more than a few developers to support older operating systems.

                                                            At my old job we supported only two versions of our software product, Tanzu Operations Manager versions 2.10.x and 3.0.y), and we cut new patch releases every few weeks (similar to Apple's cadence). Bumping dependencies was a pain. Well, usually it went fine, but sometimes you'd hit a gnarly incompatibility and you'd either pin a Ruby package to a known version or try to modify the code just enough to make it work without making a major change.

                                                            If I had to put a number to it, I'd say it cost us 2 developers to keep our older product line consistently patched, and our product was a modest Ruby app, much less complicated than an entire OS.

                                                            • justinclift 10 months ago

                                                              > new patch releases every few weeks (similar to Apple's cadence)

                                                              Is Apply really releasing new patched OS updates every few weeks?

                                                            • wannacboatmovie 10 months ago

                                                              You act as if we should be thankful for 6 years of support when the hardware and sane support cycles easily exceed 10 years. And those aren't 6 years of security updates; they are 6 years of forced yearly feature upgrades and breaking things along the way.

                                                              • fn-mote 10 months ago

                                                                What software are you talking about?

                                                                Who is forcing you to upgrade?

                                                                For that matter, what hardware?

                                                                I run an old Intel Mac and it’s perfectly reasonable for casual work. I’m not paying for stuff like Adobe leases though.

                                                                • vetinari 10 months ago

                                                                  What exactly is an old Intel mac and what is a casual work?

                                                                  For example, I have 2015 macbook pro. The last macos release for it is Monterey. Even brew has problems with that, erroring out when installing packages like libpng and complaining, that I should upgrade xcode cli tools. Which I can't.

                                                              • fouc 10 months ago

                                                                my favorite Intel MacBook is from 2015

                                                                • chris_wot 10 months ago

                                                                  Not on Macbook Airs that are only 3-5 years old though. We have a number that we plan on replacing after EOY, but we are still using for now. Can't get Sequoia.

                                                                  • phony-account 10 months ago

                                                                    > Macbook Airs that are only 3-5 years old

                                                                    MacBook Airs from 2020 support Sequoia - so just the very upper limit of your range is relevant.

                                                                    • wannacboatmovie 10 months ago

                                                                      Absolutely not. Apple was still selling non-Retina Intel MacBook Airs until 2019. Those are now completely unsupported with no security updates having topped out at Monterrey. 5 years of updates on a new laptop is borderline criminal.

                                                                    • chris_wot 10 months ago

                                                                      I see the Mac fanboys aren't happy with my factual statement. I love Macs (won't use anything else) but I also live in reality.

                                                                      • password4321 10 months ago

                                                                        Not really suitable for a corporate environment but in case you weren't aware:

                                                                        https://github.com/dortania/OpenCore-Legacy-Patcher

                                                                        macOS Big Sur and newer on machines as old as 2007

                                                                        macOS Big Sur, Monterey, Ventura, Sonoma and Sequoia

                                                                        • chris_wot 10 months ago

                                                                          Nice. Yeah, never going to fly here :( pity

                                                                    • hulitu 10 months ago

                                                                      > Don't tell me the richest company in the world can't pay for a couple of developers who just want to rest and vest to take care of and test the legacy platforms.

                                                                      Why would they shoot themselves in the foot ? If the new MacOS does not run on older HW and they don't release patches (no development team) it is a win-win situation: user must buy a new Mac and no money is wasted supporting old HW.

                                                                • dataflow 10 months ago

                                                                  It might just be that the only machines they have information about are Intel? It doesn't say how many data points they have, but if it's only a handful then it's not at all surprising.

                                                                  • acdha 10 months ago

                                                                    That’s what I was wondering: if this is like some of those Citizen Lab reports it might simply be that they have a small number of targeted individuals who noticed something and reported it.

                                                                  • ngneer 10 months ago

                                                                    I came to ask this very question. Could be an Intel hardware bug, but then we would see an advisory from Intel. So, it must be a different issue. Apple probably did not realize that their advisory implicates Intel components rather than Apple components.

                                                                  • alphabetting 10 months ago

                                                                    >The vulnerabilities, credited to Google’s TAG (Threat Analysis Group)

                                                                    Do they find these by monitoring the brokers of zero days or analyzing devices of people who are being targeted?

                                                                    • ledoge 10 months ago

                                                                      There's actually a very recent talk about this! https://www.youtube.com/watch?v=2zrcemxCg4Y

                                                                    • wutwutwat 10 months ago

                                                                      little of column a, little of column b

                                                                      they also have insane peering and backbone network infra, run one of the largest cloud providers, host basically everyone's email, documents, and file storage, chat, app store, and have a native browser installed

                                                                      I'm sure they have many different signals they can look at to see compromised type behavior differing from the profile they have on you

                                                                      • xorcist 10 months ago

                                                                        Both, but also a lot of original research. They are public about this.

                                                                        • myHNAccount123 10 months ago

                                                                          I suspect firebase crashlytics is the source of many

                                                                        • grupthink 10 months ago

                                                                          I have a perfectly functional iPad 5 that no longer receives software updates. It'd be cool if Apple would at least give it security updates, or allow alternative browser engines that don't have this vulnerability. If my iPad gets pwned, my day is going to suck.

                                                                          • Jtsummers 10 months ago

                                                                            iPadOS 16 was at least updated 3 months ago (August) so there's a chance you could still get a security update if it's applicable to that version. iPadOS 15 was updated in July.

                                                                            https://en.wikipedia.org/wiki/IPadOS_version_history

                                                                            • grupthink 10 months ago

                                                                              That wasn't an actual security update; that only fixed a broken toggle switch for "Advanced Data Protection" in Settings. I'm talking about patches for vulnerabilities.

                                                                              iPadOS 15 hasn't been receiving the security updates for vulnerabilities that have been released for iPadOS 18.

                                                                            • zarzavat 10 months ago

                                                                              Apple really cares about saving the planet so they will graciously allow you to recycle your working iPad and buy a new one.

                                                                              • wannacboatmovie 10 months ago

                                                                                [flagged]

                                                                                • stephen_g 10 months ago

                                                                                  It's probably because the first bit isn't really true (iPads have a longer supported life than many Android tablets, for example I updated my 2018 iPad Pro with the most recent iPadOS 18.1.1 including this security fix earlier today). And given that the silly joke falls flat.

                                                                                  The iPad 5 in question from the OP supports iPadOS 16 and that last got a security update in August of this year. So if it hasn't got an update today then possibly the vulnerability was only introduced in iOS / iPadOS 17.

                                                                                  • saagarjha 10 months ago

                                                                                    I can assure you that the toilet paper is much more comfortable than dollar bills.

                                                                                    • undefined 10 months ago
                                                                                      [deleted]
                                                                                      • brookst 10 months ago

                                                                                        Meta meta: comments making vague complaints about other comments being downvoted, typically get downvoted.

                                                                                    • timeon 10 months ago

                                                                                      Does this affect Firefox/Chrome on macOS?

                                                                                      • undefined 10 months ago
                                                                                        [deleted]
                                                                                        • bigiain 10 months ago

                                                                                          I'd guess yes, since they're both (due to Apple rules) basically wrappers around webkit and JavaScriptCore. (Modulo the possible hint that this is just an Intel-based Mac systems problem)

                                                                                          • Jtsummers 10 months ago

                                                                                            > I'd guess yes, since they're both (due to Apple rules) basically wrappers around webkit and JavaScriptCore.

                                                                                            That is not true for macOS which is what GP asked about.

                                                                                            • mdavidn 10 months ago

                                                                                              While that is true on iOS, macOS has no such restriction on Firefox or Chrome.

                                                                                              • pram 10 months ago

                                                                                                macOS != iOS, Firefox uses Gecko.

                                                                                            • rswail 10 months ago

                                                                                              Interesting that I had a security update for iOS (18.1.1) and a Safari update for MacOS (still running Sonoma)

                                                                                              • hrvstr 10 months ago

                                                                                                Hmm, may I ask what version you are running now? I am on Sonoma too and don't see any updates. The apple support page lists macOS Sonoma 14.7.1 as the most recent version released on 28 Oct 2024. https://support.apple.com/en-us/100100

                                                                                                • rswail 10 months ago

                                                                                                  I had an update for Safari, not Sonoma.

                                                                                                  The update to Safari was 18.1.1 according to

                                                                                                      softwareupdate --history
                                                                                              • undefined 10 months ago
                                                                                                [deleted]
                                                                                                • consumerx 10 months ago

                                                                                                  [flagged]

                                                                                                  • tgv 10 months ago

                                                                                                    And what's your advice when there's a threat for Linux?

                                                                                                    • undefined 10 months ago
                                                                                                      [deleted]
                                                                                                      • TheRealNGenius 10 months ago

                                                                                                        [dead]

                                                                                                    • pjmlp 10 months ago

                                                                                                      [flagged]

                                                                                                    • consumerx 10 months ago

                                                                                                      that's why you turn on Lockdown Mode or swap to Linux completely :)

                                                                                                      • danieldk 10 months ago

                                                                                                        I love Linux, but this is really a cheap shot. Out of the box, desktop security is much better on the Mac. Slim boot ROM in place of UEFI (which can be backdoored), no always-running Intel ME/AMD PSP, fully verified boot chain, sealed system volumes, heavy use of a secure enclave to protect secrets, mandatory sandboxing for App Store apps, malware checks through XProtect, limited access of apps to key folders (Desktop, Documents, iCloud Drive), limited access to privacy-sensitive devices (camera, mic), etc.

                                                                                                        Linux will get there, but currently macOS is much more secure as a desktop.

                                                                                                        • vetinari 10 months ago

                                                                                                          Half of the stuff you names is security from you, not security for you.

                                                                                                          • danieldk 10 months ago

                                                                                                            You can turn pretty much all of it off, disable SIP, boot Linux, whatever you like.

                                                                                                            Good security is layered. For example, even with a sandbox escape, and app could not read your full Documents directory, modify the OS, or install a firmware-level rootkit.

                                                                                                          • adrian_b 10 months ago

                                                                                                            While in general you are right, you should not forget that almost one year ago it has been revealed that the "Apple Silicon" CPUs had a hardware backdoor that had been exploited for years by malicious entities (i.e. some unprotected test registers that allowed the attacker to bypass the memory protection and gain complete control remotely, through the sending of an invisible message, without any chance of being detected by the owner; the complete exploit had used a chain of bugs in the Apple system libraries, together with the hardware backdoor).

                                                                                                            Such a hardware backdoor is rather more severe than most of what has ever been discovered on non-Apple devices.

                                                                                                            As long as the main protection of the Apple devices consists mostly in their lack of detailed technical documentation, one can never know whether other such hardware backdoors exist.

                                                                                                            • acdha 10 months ago

                                                                                                              Do you have a reference for that? It doesn’t sound like GoFetch, which is the closest on timing.

                                                                                                          • leoh 10 months ago

                                                                                                            I have got to believe that there are some nasty zero days for linux

                                                                                                            • proxynoproxy 10 months ago

                                                                                                              The advantage of everyone running the same software and hardware platform is that you can concentrate on hardening that one system. The disadvantage is that vulnerability is universal.

                                                                                                              The advantage of everyone running a disparate environment of many of different libraries and binaries is that vulnerability is likely unique. The disadvantage is there are many more opportunities for the researcher to find vulnerability in the mess.

                                                                                                              Choose your poison, the only secure system is powered down.

                                                                                                              • notactuallyben 10 months ago

                                                                                                                Vulnerabilities in the Linux kernel would have a similar impact to a macOS kernel bug. It’s a myth that “more eyes means more secure” for OSS ;-) - it can be true, but often that’s not the reason

                                                                                                            • fsflover 10 months ago

                                                                                                              You probably mean to Qubes OS.