Vulnerability in iOS 12 allows attackers to retrieve files from Apple devices without user interaction

Image
Decorative image
Published : 01/08/2019

Reference:
Advisory #2019-019

Version:
1.0

Affected software:
iOS 12 (>12.4)

Type:
Remote data exfiltration

CVE/CVSS:
unrated

Sources

Risks

Remote data exfiltration without user interaction.

Description

The issue is caused by the _NSDataFileBackedFuture class which can be deserialized even if secure encoding is enabled leading to two major problems:

-        Arbitrary access to local files is allowed if the code deserializing the buffer shares memory with it.

-        An NSData object can be created with a length mismatch with the length of its byte array, leading to remote reads (and potentially write operations).

These actions could lead, for example to the SMS database or binary files (like images) to be exfiltrated without user interaction.

Recommended Actions

CERT.be recommends all users of Apple iOS devices to upgrade their devices to the latest version of iOS today.

remark: Only iPhone models 5s and later, iPad Air (and later iPad models), iPod Touch 6th generation and later are able to run iOS 12. This vulnerability only exists in iOS 12. 

References

https://support.apple.com/en-us/HT210346