The vulnerabilities disclosed last week by Google and the Thunderstrike flaw detailed in December by a researcher have been reportedly fixed by Apple in OS X Yosemite 10.10.2 beta.
Apple has not responded to SecurityWeek’s emails regarding the status of the three high-severity issues made public last week by Google’s Project Zero. However, iMore has learned from people who have access to OS X Yosemite 10.10.2, which will be made available to all users soon, that the update includes fixes for these vulnerabilities.
This isn’t surprising considering that the issues were reported by Ian Beer, the Google researcher who identified several vulnerabilities in Apple products over the past months.
The security holes were reported to Apple in October and they were made public after the 90-day disclosure deadline given by Google to software developers expired.
One of the flaws, a sandbox escape, appears to have already been fixed in OS X Yosemite. The other bugs are a code execution vulnerability and a memory corruption, both affecting the IOKit kernel.
Another issue reportedly addressed in OS X Yosemite 10.10.2 is Thunderstrike, a serious vulnerability (CVE-2014-4498) demonstrated by researcher Trammell Hudson at the 31C3 security conference in Germany in late December.
The expert showed that an attacker with physical access to an Apple device can use the Thunderbolt port to install a highly persistent bootkit on the EFI (Extensible Firmware Interface) boot read-only memory (ROM) within minutes. The malware could spread from one computer to the other via Thunderbolt devices attached to the infected machine.
The proof-of-concept (PoC) malware developed by Hudson doesn’t have a malicious payload, but a weaponized version of the threat can give an attacker total control of the infected machine. Furthermore, the bootkit would be highly difficult to detect and remove.
Apple has already started shipping partial patches for Mac Mini and iMac with Retina display devices, Hudson noted at the conference. Yosemite 10.10.2 will address this issue on all Macs by preventing the boot ROM from being replaced and by blocking attempts to roll back the firmware to a previous version that allowed such attacks, iMore said in a separate report.

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Intel Boasts Attack Surface Reduction With New 13th Gen Core vPro Platform
- Dole Says Employee Information Compromised in Ransomware Attack
- High-Severity Vulnerabilities Found in WellinTech Industrial Data Historian
- CISA Expands Cybersecurity Committee, Updates Baseline Security Goals
- Exploitation of 55 Zero-Day Vulnerabilities Came to Light in 2022: Mandiant
- Organizations Notified of Remotely Exploitable Vulnerabilities in Aveva HMI, SCADA Products
- Waterfall Security, TXOne Networks Launch New OT Security Appliances
- Hitachi Energy Blames Data Breach on Zero-Day as Ransomware Gang Threatens Firm
Latest News
- US Charges 20-Year-Old Head of Hacker Site BreachForums
- Tesla Hacked Twice at Pwn2Own Exploit Contest
- CISA Ships ‘Untitled Goose Tool’ to Hunt for Microsoft Azure Cloud Infections
- Critical WooCommerce Payments Vulnerability Leads to Site Takeover
- PoC Exploit Published for Just-Patched Veeam Data Backup Solution Flaw
- CISA Gets Proactive With New Pre-Ransomware Alerts
- Watch on Demand: Supply Chain & Third-Party Risk Summit Sessions
- TikTok CEO Grilled by Skeptical Lawmakers on Safety, Content
