Skip to main content

Google shares zero-click vulnerabilities that affected all iPhones, Apple hardware

Google’s Project Zero security team shared their findings of a series of zero-click vulnerabilities that affected the iPhone and other Apple hardware.

The vulnerabilities were disclosed on the dedicated Project Zero blog, with the teams findings going into detail on just what this means for iPhone owners. The team at Project Zero found an issue in the multimedia processing ImageIO framework — which is present on all Apple systems including iOS, macOS, watchOS, and even tvOS. This is used to parse image files and image metadata.

When you receive an image file by text or email, ImageIO handles the parsing process to basically work out what the image file is. As this process is automated and doesn’t require any sort of user interaction, any malicious code concealed within the image means that hackers love to exploit this kind of security flaw.

By using a technique called “fuzzing,” the Google team tested just how the ImageIO framework handled incorrect image format processing. They found six vulnerabilities within ImageIO, and a further eight in a third-party image format OpenEXR.

The vulnerabilities could be exploited using third-party messaging apps, but rather that the apps themselves and the associated source code being the issue, it was at a system level. That meant the problem had to be resolved by Apple themselves.

The Google analysts promptly reported the bugs to Apple, which has seen all of the vulnerabilities patched through several OS updates. The ImageIO issues were fixed in January and April 2020, while the OpenEXR vulnerabilities have been fixed with its latest update 2.41.

It is likely that, given enough effort (and exploit attempts granted due to automatically restarting services), some of the found vulnerabilities can be exploited for RCE in a 0click attack scenario. Unfortunately it is also likely that other bugs remain or will be introduced in the future.

As such, continuous fuzz-testing of this and similar media format parsing code as well as aggressive attack-surface reduction, both in operating system libraries (in this case ImageIO) as well as messenger apps (by restricting the number of accepted image formats on the receiver) are recommended.

However, Samuel Groß, a researcher from the Project Zero team, claims that even though all of the issues that his team found have already been patched by Apple, some other vulnerabilities utilizing the same technique are still present with persistent malicious hackers. This means that these vulnerabilities could be exploited as further zero-click attacks on Apple devices such as the iPhone and associated hardware.

While no OS is completely secure at any one time, this issue points out the importance of keeping your devices up to date with the relevant security patches and OS updates to ensure you are always fully protected against those with malicious intents.

More on Google:

FTC: We use income earning auto affiliate links. More.

You’re reading 9to5Google — experts who break news about Google and its surrounding ecosystem, day after day. Be sure to check out our homepage for all the latest news, and follow 9to5Google on Twitter, Facebook, and LinkedIn to stay in the loop. Don’t know where to start? Check out our exclusive stories, reviews, how-tos, and subscribe to our YouTube channel

Comments

Author

Avatar for Damien Wilde Damien Wilde

Damien is a UK-based video producer for 9to5Google.

Find him on Threads: @damienwildeyt

Email: damien@9to5mac.com / secure email: damienwilde@protonmail.com


Damien Wilde's favorite gear

Manage push notifications

notification icon
We would like to show you notifications for the latest news and updates.
notification icon
You are subscribed to notifications
notification icon
We would like to show you notifications for the latest news and updates.
notification icon
You are subscribed to notifications