Security Experts:

Connect with us

Hi, what are you looking for?



Apple to Patch Thunderstrike, Vulnerabilities Disclosed by Google

The vulnerabilities disclosed last week by Google and the Thunderstrike flaw detailed in December by a researcher have been reportedly fixed by Apple in OS X Yosemite 10.10.2 beta.

The vulnerabilities disclosed last week by Google and the Thunderstrike flaw detailed in December by a researcher have been reportedly fixed by Apple in OS X Yosemite 10.10.2 beta.

Apple has not responded to SecurityWeek’s emails regarding the status of the three high-severity issues made public last week by Google’s Project Zero. However, iMore has learned from people who have access to OS X Yosemite 10.10.2, which will be made available to all users soon, that the update includes fixes for these vulnerabilities.

This isn’t surprising considering that the issues were reported by Ian Beer, the Google researcher who identified several vulnerabilities in Apple products over the past months.

The security holes were reported to Apple in October and they were made public after the 90-day disclosure deadline given by Google to software developers expired.

One of the flaws, a sandbox escape, appears to have already been fixed in OS X Yosemite. The other bugs are a code execution vulnerability and a memory corruption, both affecting the IOKit kernel.

Another issue reportedly addressed in OS X Yosemite 10.10.2 is Thunderstrike, a serious vulnerability (CVE-2014-4498) demonstrated by researcher Trammell Hudson at the 31C3 security conference in Germany in late December.

The expert showed that an attacker with physical access to an Apple device can use the Thunderbolt port to install a highly persistent bootkit on the EFI (Extensible Firmware Interface) boot read-only memory (ROM) within minutes. The malware could spread from one computer to the other via Thunderbolt devices attached to the infected machine.

The proof-of-concept (PoC) malware developed by Hudson doesn’t have a malicious payload, but a weaponized version of the threat can give an attacker total control of the infected machine. Furthermore, the bootkit would be highly difficult to detect and remove.

Apple has already started shipping partial patches for Mac Mini and iMac with Retina display devices, Hudson noted at the conference. Yosemite 10.10.2 will address this issue on all Macs by preventing the boot ROM from being replaced and by blocking attempts to roll back the firmware to a previous version that allowed such attacks, iMore said in a separate report.

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.


Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.


Expert Insights

Related Content


Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...


Apple has released updates for macOS, iOS and Safari and they all include a WebKit patch for a zero-day vulnerability tracked as CVE-2023-23529.

Application Security

Drupal released updates that resolve four vulnerabilities in Drupal core and three plugins.

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

IoT Security

Lexmark warns of a remote code execution (RCE) vulnerability impacting over 120 printer models, for which PoC code has been published.

Application Security

A CSRF vulnerability in the source control management (SCM) service Kudu could be exploited to achieve remote code execution in multiple Azure services.


GoAnywhere MFT users warned about a zero-day remote code injection exploit that can be targeted directly from the internet