Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Mobile & Wireless

Apple Patches Recent iPhone Jailbreak Zero-Day

Apple on Monday released security patches to address a zero-day vulnerability that had been used to jailbreak iPhones running iOS 13.5.

Tracked as CVE-2020-9859, the vulnerability was found in the iOS kernel and it can allow an application to achieve unsandboxed, kernel-level code execution.

Apple on Monday released security patches to address a zero-day vulnerability that had been used to jailbreak iPhones running iOS 13.5.

Tracked as CVE-2020-9859, the vulnerability was found in the iOS kernel and it can allow an application to achieve unsandboxed, kernel-level code execution.

An exploit for the issue was added to the unc0ver 5.0 jailbreak utility, which was released to support devices running iOS 11 through 13.5 (excluding versions 12.3-12.3.2 and 12.4.2-12.4.5).

In an alert published last week, the CERT Coordination Center warned that the security flaw might also impact modern iOS devices with CPUs that support Pointer Authentication Code (PAC).

One week later, Apple has released security patches to fix the issue, revealing that the root cause of the bug was memory consumption and that improved memory handling would address it.

The Cupertino-based tech company also confirmed that the vulnerability indeed could have been exploited by applications to execute arbitrary code with kernel privileges.

Advertisement. Scroll to continue reading.

Apple says the flaw was patched with the release of iOS 13.5.1 and iPadOS 13.5.1, now rolling out to iPhone 6s and later, iPad Air 2 and later, iPad mini 4 and later, and iPod touch 7th generation.

Additionally, the company released updates for macOS High Sierra 10.13.6 and macOS Catalina 10.15.5 (macOS Catalina 10.15.5 Supplemental Update, Security Update 2020-003 High Sierra), Apple TV 4K and Apple TV HD (tvOS 13.4.6), and Apple Watch Series 1 and later (watchOS 6.2.6) to patch the vulnerability.

Pwn20wnd, the team of developers behind unc0ver, confirmed that iOS 13.5.1 patches the vulnerability exploited by their tool, while also warning users that they should refrain from updating if they want to keep their devices jailbroken.

“I can confirm the new *OS updates have patched the kernel vulnerability used by the #unc0ver jailbreak,” the team said in a tweet.

Users with eligible iOS devices looking to install the latest platform release can download it over-the-air by heading to Settings > General > Software Update.

Related: Jailbreak Tool Updated to Unlock iPhones Running iOS 13.5

Related: Apple Patches Over 40 Vulnerabilities in macOS Catalina

Related: Apple Finds No Evidence of Attacks Targeting iOS Mail App Vulnerabilities

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Organizations are investing heavily in third-party risk management, but breaches, delays, and blind spots continue to persist. Join this live webinar as we examine the gap between how organizations think their third-party risk programs are performing and what’s actually happening in practice.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Tim Byrd has been appointed Chief Information Security Officer at First Citizens Bank.

IRONSCALES has named Steve McKenzie as Chief Operating Officer.

Silvio Pappalardo has joined AuthMind as Chief Revenue Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.