A security researcher claims Apple paid a $100,000 bug bounty reward for a critical vulnerability in Sign in with Apple, the company’s privacy-focused authentication system.
The vulnerability was reported to the Cupertino-based tech giant in April, and was found to impact third-party applications that were using Sign in with Apple without additional security measures.
An attacker exploiting the vulnerability could have taken over user accounts on the affected third-party applications, regardless of whether the victim was using a valid Apple ID or not, security researcher Bhavuk Jain explains.
Sign in with Apple, the researcher explains, can authenticate a user either by using a JWT (JSON Web Token) or a code generated by the Apple server (which is then used to create a JWT).
In the second step, the user is provided with the option to share the Apple Email ID with the third-party app. If the user does not share their ID, a user-specific Apple relay Email ID is generated, and then a JWT that contains this Email ID is created, for the third-party app to log in the user.
“I found I could request JWTs for any Email ID from Apple and when the signature of these tokens was verified using Apple’s public key, they showed as valid. This means an attacker could forge a JWT by linking any Email ID to it and gaining access to the victim’s account,” the researcher reports.
The vulnerability, Jain notes, is considered critical severity, given that it could result in full account takeover, and has a broad impact, because many developers have integrated Sign in with Apple with their software.
Sign in with Apple is mandatory for applications that support other social logins, and highly popular services such as Dropbox, Spotify, Airbnb, and Giphy use it for their apps, the researcher notes.
“These applications were not tested but could have been vulnerable to a full account takeover if there weren’t any other security measures in place while verifying a user,” Jain says.
The researcher also claims that Apple has paid a $100,000 bug bounty for the finding, as part of the Apple Security Bounty program. However, he says the company has not found evidence of misuse or account compromise due to this vulnerability.
SecurityWeek has contacted Apple for confirmation on the developer’s claims, but received no response at the time of writing.
Related: Apple Kicks Off Public Bug Bounty Program
Related: Facebook Paid $2.2 Million in Bug Bounty Rewards in 2019
Related: Dropbox Paid Out Over $1 Million Through Bug Bounty Program

More from Ionut Arghire
- Ransomware Gang Publishes Data Allegedly Stolen From Maritime Firm Royal Dirkzwager
- Zoom Paid Out $3.9 Million in Bug Bounties in 2022
- Malicious NuGet Packages Used to Target .NET Developers
- Google Pixel Vulnerability Allows Recovery of Cropped Screenshots
- Millions Stolen in Hack at Cryptocurrency ATM Manufacturer General Bytes
- NBA Notifying Individuals of Data Breach at Mailing Services Provider
- Adobe Acrobat Sign Abused to Distribute Malware
- Latitude Financial Services Data Breach Impacts 300,000 Customers
Latest News
- Ransomware Gang Publishes Data Allegedly Stolen From Maritime Firm Royal Dirkzwager
- Zoom Paid Out $3.9 Million in Bug Bounties in 2022
- Oleria Scores $8M Seed Funding for ID Authentication Technology
- Exploitation of 55 Zero-Day Vulnerabilities Came to Light in 2022: Mandiant
- News Analysis: UK Commits $3 Billion to Support National Quantum Strategy
- Malicious NuGet Packages Used to Target .NET Developers
- Google Pixel Vulnerability Allows Recovery of Cropped Screenshots
- Organizations Notified of Remotely Exploitable Vulnerabilities in Aveva HMI, SCADA Products
