[TheRecord] Researcher discloses iPhone lock screen bypass on iOS 15 launch day

On the day Apple released iOS 15, a Spanish security researcher disclosed an iPhone lock screen bypass that can be exploited to grant attackers access to a user’s notes.

In an interview with The Record, Jose Rodriguez said he published details about the lock screen bypass after Apple downplayed similar lock screen bypass issues he reported to the company earlier this year.

“Apple values reports of issues like this with up to $25,000 but for reporting a more serious issue, I was awarded with $5,000,” the researcher wrote on Twitter last week.

In hopes Apple realizes that is being tightwad rewarding security bug reports, and reconsider the bounties. https://t.co/g6TEIWmVDJ

— Jose Rodriguez (@VBarraquito) September 15, 2021

Rodriguez said he was referring to lock screen bypasses tracked as CVE-2021-1835 and CVE-2021-30699, which Apple patched in April and May, respectively.

The two issues allowed threat actors to access instant messaging apps like Twitter, WhatsApp, or Telegram even while the phone was locked [video here].

“Apple mitigated this, [but] didn’t fix at all, and they never asked me if the issue was fixed,” Rodriguez told The Record today.

Because of the unprofessional way Apple handled his bug report, the researcher published today a variation of the same bypass, but this time one that uses the Apple Siri and VoiceOver services to access the Notes app from behind the screen lock.

Rodriguez has now added his name today to a long list of security researchers who have criticized Apple for how it handles its public bug bounty program.

Washington Post article published two weeks ago contained similar accusations from other researchers about how the company’s security team was leaving bug reports unsolved for months, shipping incomplete fixes, low-balling monetary rewards, or banning researchers from their program when they complained.

The post Researcher discloses iPhone lock screen bypass on iOS 15 launch day appeared first on The Record by Recorded Future.

Source: Read More (The Record by Recorded Future)

You might be interested in …

[HackerNews] Dozens of Security Flaws Discovered in UEFI Firmware Used by Several Vendors

All posts, HackerNews

As many as 23 new high severity security vulnerabilities have been disclosed in different implementations of Unified Extensible Firmware Interface (UEFI) firmware used by numerous vendors, including Bull Atos, Fujitsu, HP, Juniper Networks, Lenovo, among others. The vulnerabilities reside in Insyde Software’s InsydeH2O UEFI firmware, according to enterprise firmware security company Binarly, Source: Read More (The […]

Read More

[ZDNet] New Conti ransomware source code leaked

All posts, ZDNet

The individual responsible is targeting Conti after the group announced its loyalty to Russia during the invasion of Ukraine. Source: Read More (Latest topics for ZDNet in Security)

Read More

[HackerNews] Hackers Actively Searching for Unpatched Microsoft Exchange Servers

All posts, HackerNews

Threat actors are actively carrying out opportunistic scanning and exploitation of Exchange servers using a new exploit chain leveraging a trio of flaws affecting on-premises installations, making them the latest set of bugs after ProxyLogon vulnerabilities were exploited en masse at the start of the year. The remote code execution flaws have been collectively dubbed “ProxyShell.” At least Source: […]

Read More

Leave a Reply

Your email address will not be published.

This site uses Akismet to reduce spam. Learn how your comment data is processed.