[prev in list] [next in list] [prev in thread] [next in thread] 

List:       full-disclosure
Subject:    [FD] Apple iOS 8.0 - 8.0.2 - Controls Re Auth Bypass Vulnerability
From:       Vulnerability Lab <research () vulnerability-lab ! com>
Date:       2015-04-22 8:48:20
Message-ID: 55376054.3060309 () vulnerability-lab ! com
[Download RAW message or body]

Document Title:
===============
Apple iOS 8.0 - 8.0.2 - Controls Re Auth Bypass Vulnerability


References (Source):
====================
http://www.vulnerability-lab.com/get_content.php?id=1322

Video: http://www.vulnerability-lab.com/get_content.php?id=1334


Release Date:
=============
2015-03-02


Vulnerability Laboratory ID (VL-ID):
====================================
1322


Common Vulnerability Scoring System:
====================================
5.2


Product & Service Introduction:
===============================
iOS (previously iPhone OS) is a mobile operating system developed and distributed by \
Apple Inc. Originally released in 2007 for  the iPhone and iPod Touch, it has been \
extended to support other Apple devices such as the iPad and Apple TV. Unlike \
Microsoft`s  Windows Phone (Windows CE) and Google`s Android, Apple does not license \
iOS for installation on non-Apple hardware. As of  September 12, 2012, Apple`s App \
Store contained more than 700,000 iOS applications, which have collectively been \
downloaded more  than 30 billion times. It had a 14.9% share of the smartphone mobile \
operating system units shipped in the third quarter of 2012,  behind only Google`s \
Android. In June 2012, it accounted for 65% of mobile web data consumption (including \
use on both the iPod  Touch and the iPad). At the half of 2012, there were 410 \
million devices activated. According to the special media event held by  Apple on \
September 12, 2012, 400 million devices have been sold through June 2012.

The user interface of iOS is based on the concept of direct manipulation, using \
multi-touch gestures. Interface control elements  consist of sliders, switches, and \
buttons. Interaction with the OS includes gestures such as swipe, tap, pinch, and \
reverse pinch,  all of which have specific definitions within the context of the iOS \
operating system and its multi-touch interface. Internal  accelerometers are used by \
some applications to respond to shaking the device (one common result is the undo \
command) or rotating  it in three dimensions (one common result is switching from \
portrait to landscape mode).

iOS is derived from OS X, with which it shares the Darwin foundation. iOS is Apple`s \
mobile version of the OS X operating system  used on Apple computers.

In iOS, there are four abstraction layers: the Core OS layer, the Core Services \
layer, the Media layer, and the Cocoa Touch layer.  The current version of the \
operating system (iOS 6.1) dedicates 1-1.5 GB of the device`s flash memory for the \
system partition,  using roughly 800 MB of that partition (varying by model) for iOS \
itself. iOS currently runs on iPhone, Apple TV, iPod Touch, and iPad.

( Copy of the Homepage: http://en.wikipedia.org/wiki/IOS )



Abstract Advisory Information:
==============================
The Vulnerability Laboratory Research Team discovered bypass vulnerability in the \
official Apple (iPhone) iOS v8.0 (12A365) - v8.0.2 mobile device system.


Vulnerability Disclosure Timeline:
==================================
2014-09-18: Researcher Notification & Coordination (Benjamin Kunz Mejri - VL Core \
                Research Team)
2014-09-28: Vendor Notification (Apple Security Team - Acknowledgement Program)
2015-03-02: Public Disclosure (Vulnerability Laboratory)


Discovery Status:
=================
Published


Affected Product(s):
====================
Apple
Product: iOS 8.0


Exploitation Technique:
=======================
Local


Severity Level:
===============
Medium


Technical Details & Description:
================================
A local pass code (code lock) bypass and glitch has been discovered in the Apple iOS \
v8.0 (12A365) mobile device system. The vulnerability allows to bypass or evade via \
glitch the regular pass code restriction of the embed iOS device system.

The local bypass vulnerability is located in the favorite contact preview function \
that can be used for imessages or phone calls.  Local attackers with physical access \
can glitch the display by usage of siri to bypass since the end of a call the device \
system  access restriction.

To exploit the attacker visit the favorite call function via the home button in the \
ios task favorite preview slideshow. He clicks  a contact and uses siri to merge via \
glitch with the authorized call app. In the next step he locks the mobile device. The \
he  hold the volume + button multiple times to keep the service since the call end \
ahead to the pass code logon screen. The issue  is very tricky to exploit but affects \
at the end obviously secure pass code restriction. The attacker is able to multiple \
times  push in the last moment the power button to deactivate the display and start \
the pass code lock. However the local attacker is  able to bypass exactly this \
mechanism in the mentioned location.

During the tests the security researcher revealed a video that demonstrates the \
security issue and the glitch that affects the  local device security. Like in the \
Samsung in 2010 the device allows to access the information as long as a call runs in \
 the phone app. The local issue has been tested to verify with the default configured \
iphone 6 and 5s device.

The security risk of the local pass code bypass vulnerability is estimated as medium \
with a cvss (common vulnerability scoring  system) count of 5.2. Exploitation of the \
local glitch bypass vulnerability requires a privileged web-application user account, \
 multi user account or restricted physical device access without user interaction. \
Successful exploitation of the local pass code  bypass vulnerability results in \
device compromise or information leaking.


Affected Device(s):
			[+] Apple > iPhone 5 & 6

Affected OS Version(s):
			[+] iOS v8.0 (12A365)

Tested Device(s):
			[+] Apple iPhone 5s & 6 > iOS v8.0 (12A365)


Proof of Concept (PoC):
=======================
The auth bypass vulnerability can be exploited by local attackers with physical \
device access without user interaction. For security demonstration or to reproduce \
the issue follow the provided information and steps below to continue.

Requirement(s):
			[+] iOS v8.0 (default install)
			[+] Apple Device (iPad 2, iPhone 5s or iPhone 6)
			[+] Two healthy hands ;)


Manual Steps to reproduce the local vulnerability ...

1. Start your iOS device and install the new iOS v8.0 to your ipad2, iphone 5s or \
iphone 6 device 2. Start the mobile and login to the pass code
3. Now press the home button twice to see the app preview slide show and the new \
favorite contract slideshow above 4. move you finger over the favorite contact and \
two symboles become visible (Phone app and Message app) 5. Press now the home button \
two seconds to activate siri and push in the last second the private call button to \
                the contact
Note: Be fast! After it the siri which is in default mode available glitches ahead to \
the phone call 6. Now you push the power button on top of the mobile and shortly \
                after it you use the hardware volumen to reactivate
Note: The mobile now goes in the locked mode after the power button push but the siri \
is ahead glitched to the call that runs 7. In the call mask you can click the \
contacts button by pressing around the button because of the siri glitch 8. The \
contact list becomes available as long as the call runs with the glitch through siri \
9. Successul bypass of the secure pass code restriction! 

Reference(s):
			../poc-video.wmv

Picture(s):
			../1.png
			../2.png
			../3.png
			../4.png
			../5.png
			../6.png
			../7.png
			../8.png


Security Risk:
==============
The security risk of the local auth bypass issue and glitch in the iOS v8.0 is \
estimated as medium. (CVS 5.2)


Credits & Authors:
==================
Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri \
(bkm@evolution-sec.com) [www.vulnerability-lab.com]


Disclaimer & Information:
=========================
The information provided in this advisory is provided as it is without any warranty. \
Vulnerability Lab disclaims all warranties, either expressed  or implied, including \
the warranties of merchantability and capability for a particular purpose. \
Vulnerability-Lab or its suppliers are not liable  in any case of damage, including \
direct, indirect, incidental, consequential loss of business profits or special \
damages, even if Vulnerability-Lab  or its suppliers have been advised of the \
possibility of such damages. Some states do not allow the exclusion or limitation of \
liability for  consequential or incidental damages so the foregoing limitation may \
not apply. We do not approve or encourage anybody to break any vendor licenses,  \
policies, deface websites, hack into databases or trade with fraud/stolen material.

Domains:    www.vulnerability-lab.com   	- www.vuln-lab.com			       		- \
                www.evolution-sec.com
Contact:    admin@vulnerability-lab.com 	- research@vulnerability-lab.com 	       		- \
                admin@evolution-sec.com
Section:    magazine.vulnerability-db.com	- vulnerability-lab.com/contact.php		       \
                - evolution-sec.com/contact
Social:	    twitter.com/#!/vuln_lab 		- facebook.com/VulnerabilityLab 	       		- \
                youtube.com/user/vulnerability0lab
Feeds:	    vulnerability-lab.com/rss/rss.php	- \
vulnerability-lab.com/rss/rss_upcoming.php   		- \
                vulnerability-lab.com/rss/rss_news.php
Programs:   vulnerability-lab.com/submit.php  	- \
vulnerability-lab.com/list-of-bug-bounty-programs.php	- \
vulnerability-lab.com/register/

Any modified copy or reproduction, including partially usages, of this file requires \
authorization from Vulnerability Laboratory. Permission to  electronically \
redistribute this alert in its unmodified form is granted. All other rights, \
including the use of other media, are reserved by  Vulnerability-Lab Research Team or \
its suppliers. All pictures, texts, advisories, source code, videos and other \
information on this website  is trademark of vulnerability-lab team & the specific \
authors or managers. To record, list (feed), modify, use or edit our material contact \
 (admin@vulnerability-lab.com or research@vulnerability-lab.com) to get a permission.

				Copyright  © 2015 | Vulnerability Laboratory - [Evolution Security GmbH]â„¢



-- 
VULNERABILITY LABORATORY - RESEARCH TEAM
SERVICE: www.vulnerability-lab.com
CONTACT: research@vulnerability-lab.com
PGP KEY: http://www.vulnerability-lab.com/keys/admin@vulnerability-lab.com%280x198E9928%29.txt




_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic