Researcher Hijacks iOS, macOS Camera with Three Safari Zero-Days

  /     /     /  
Publicated : 23/11/2024   Category : security


Researcher Hijacks iOS, macOS Camera with Three Safari Zero-Days


A security researcher earned $75,000 for finding a whopping seven zero-days in Safari, three of which can be combined to access the camera.



Apple has rewarded a security researcher $75,000 for discovering a total of seven zero-days in the Safari browser. Using only three of these flaws, an intruder could build an attack chain and access the camera and microphone on iOS and macOS devices to spy on unsuspecting people.
Ryan Pickren shared his discoveries with Apple in December 2019. The company patched the camera exploit in Safari 13.0.5, released on Jan. 28; the remaining zero-days were fixed in Safari 13.1, released on March 24. They were assigned these CVEs: CVE-2020-3852, CVE-2020-3864, CVE-2020-3865, CVE-2020-3885, CVE-2020-3887, CVE-2020-9784, and CVE-2020-9787.
Last December, Pickren decided to dig into Safari to hammer the browser with obscure corner cases until he discovered weird behavior that could be combined into a kill chain. He already had experience hunting for Safari bugs: In late 2018, when he was a penetration tester for Amazon Web Services, Pickren
received
seven universal cross-site scripting (UXSS) CVEs in the browser. However, he notes, these were found before Apple
opened
its bug bounty program to all security researchers in December 2019. 
Pickren says his main goal for this project was to access the camera on iOS and macOS devices. All the other vulnerabilities he uncovered along the way were considered bonus bugs.
It took about two weeks of intense research, Pickren says of the process that led to the discovery of seven zero-days. The project required him to dive deep into HTML spec and spend countless hours doing trial and error, he adds. I was honestly pretty surprised by how many speed bumps I ran into, he says. However, I was lucky enough to find bypasses for all of them.
The camera security model in iOS and macOS is pretty intense, Pickren writes in a technical blog post on his findings. As Apple users know, each app must be explicitly granted permission to access the camera and microphone. Most do this by displaying a pop-up alert on the screen.
But as with all rules, there is an exception: Apples own apps have free camera access and can open it without asking permission. Further, Pickren adds, new Web technologies like the MediaDevices Web API allow websites to leverage Safaris permission to access the camera. But ... this new web-based camera tech undermines the OSs native camera security model, he says.
The vulnerabilities he found exist in the way Safari parsed Uniform Resource Identifiers (URIs), managed Web origins, and initialized secure contexts. The camera attack chain could let malicious websites disguise themselves as trusted sites when viewed on Safari. If an attacker created a website and wanted camera access, it would only need to pretend to be a conference site like Skype or Zoom. Stringing the three flaws together would let the site access the camera.
Any attacker with the ability to run JavaScript in the victims browser can launch this attack, Pickren says. A realistic scenario is a rogue ad banner, but any JavaScript code with the ability to create a pop-up – for example, a standalone website or browser extension – could work. Safari shows a red camera icon in the URL bar when the camera is accessed via desktop; however, someone not trained to look for this could miss it. There is no light indicator on any iOS devices. 
Pickren reported the bug to Apple under its Security Bounty Program rules and provided a live demo under BugPoC. Apple classified the camera exploit under the category Network Attack without User Interaction: Zero-Click Unauthorized Access to Sensitive Data and paid $75,000.
Related Content:
Phishers Try Text Direction Deception Technique to Bypass Email Filters
A Day in The Life of a Pen Tester
How Enterprises Are Attacking the Cybersecurity Problem - 2019
10 Security Services Options for SMBs
Check out
The Edge
, Dark Readings new section for features, threat data, and in-depth perspectives. Todays featured story:
This is Not Your Father’s Ransomware.


Last News

▸ Researchers create BlackForest to gather, link threat data. ◂
Discovered: 23/12/2024
Category: security

▸ Travel agency fined £150,000 for breaking Data Protection Act. ◂
Discovered: 23/12/2024
Category: security

▸ 7 arrested, 3 more charged in StubHub cyber fraud ring. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Researcher Hijacks iOS, macOS Camera with Three Safari Zero-Days