Apple Patches Another Actively Exploited Zero-Day

 Apple has patched yet another zero-day bug on Monday. An anonymous researcher found the bug in both Apple's iOS and macOS platforms and were allowing attackers to take over affected systems.

The bug, tracked as CVE-2021-30807, is found in the IOMobileFrameBuffer extension in both iOS and macOS but has been fixed per each specific platform.

The three updates provided by Apple include iOS 14.7.1, iPadOS 14.7.1, and macOS Big Sur 11.5.1.

Actors exploiting the vulnerability are able to "execute arbitrary code with kernel privileges", reported Apple in their update documentation. Apple stated that they were aware of reports that threat actors exploiting this vulnerability in the wild.

While the bug was officially reported to Apple by an anonymous security researcher, Saar Amar of the Microsoft Security Response Center (MSRC) tweeted additional details that he had discovered on the flaw some months ago but hadn't yet reported his findings to Apple. 

Saar describes the vulnerability as "straightforward" and that it exists "in a flow called from the external method 83 of AppleCLCD/IOMFB (which is IOMobileFramebufferUserClient::s_displayed_fb_surface)." In order to execute the flaw, Saar states that simply calling the external method 83 will work. He provides a proof of concept exploit in his post.

Saar's reasoning for not reporting the bug was that he had planned to "find some extra time to work on it in August", but Apple was able to patch it before he could circle back on it.


Comments

Popular posts from this blog

Russian GRU Unit 29155 recent operations