{"id":13792,"date":"2019-07-30T10:16:37","date_gmt":"2019-07-30T14:16:37","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/ios-critical-vulnerabilities-124\/13792\/"},"modified":"2019-11-15T15:22:03","modified_gmt":"2019-11-15T11:22:03","slug":"ios-critical-vulnerabilities-124","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/ios-critical-vulnerabilities-124\/13792\/","title":{"rendered":"Update to iOS 12.4 right away"},"content":{"rendered":"<p>Updating your iPhone\u2019s or iPad\u2019s operating system as soon as the new version comes out is always a good idea \u2014 almost every new version of iOS contains fixes for some bugs that have been found in previous ones. But this time it might be even more crucial: iOS 12.4 fixes severe vulnerabilities in iMessage that can be exploited without any user interaction.<\/p>\n<p>The six critical vulnerabilities in iOS were found by <a href=\"https:\/\/twitter.com\/natashenka\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Natalie Silvanovich<\/a> and <a href=\"http:\/\/www.twitter.com\/@5aelo\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Samuel Gro\u00df<\/a>, members of Google\u2019s bug hunting team called Project Zero. What is known so far is that these bugs allow an attacker to run malicious code on victims iPhone or iPad with no user interaction needed. The only thing the attacker needs to do for this exploit to work is to send a malicious message to a victim\u2019s phone.<\/p>\n<p>While four of the uncovered vulnerabilities can be used for this \u201cinteraction-less\u201d remote code execution, the other two allow an attacker to read files on the hacked device and to leak data from its memory.<\/p>\n<p>All six combined, these bugs would make possible total \u201cowning\u201d of data stored on victims\u2019 iPhone without user doing anything that can be considered as dangerous. What\u2019s more, since <a href=\"https:\/\/www.kaspersky.com\/blog\/ios-security-explainer\/23811\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">there\u2019re no antiviruses for iOS<\/a>, it would be hard for a user even to spot malicious activity, not to mention preventing it.<\/p>\n<p>Such bugs are very rear and precious for malefactors. For example, according to publicly available price chart by Zerodium, bugs of this level can cost up to $1,000,000 <em>each<\/em>. And, the more the merrier, they get even pricier when they come in such a set. With that said, <a href=\"https:\/\/www.zdnet.com\/article\/google-researchers-disclose-exploits-for-interactionless-ios-attacks\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">ZDNet puts the possible price tag<\/a> for this bunch within the range of $5 to $10 million.<\/p>\n<p>Researchers are holding back specifics about one of the vulnerabilities, as in their opinion even iOS 12.4 doesn\u2019t remediate this bug. As for the rest of the details on these bugs and proof of concept of how they can be exploited by attackers, Silvanovich and Gro\u00df are <a href=\"https:\/\/www.blackhat.com\/us-19\/briefings\/schedule\/#look-no-hands----the-remote-interaction-less-attack-surface-of-the-iphone-15203\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">going to reveal them in a talk<\/a> at the upcoming Black Hat USA security conference.<\/p>\n<p>In any case, the best and most practical thing for each and every iOS user to do now is install iOS 12.4 right away. Do not hesitate with the next version of iOS, either; it will probably polish off the remaining issues related to these vulnerabilities.<\/p>\n<ul>\n<li>To update iOS, go to <em>Settings -&gt; General -&gt; Software Update<\/em> and tap <em>Download and Install<\/em>.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/07\/30181824\/ios-critical-vulnerabilities-124-update.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1242\" height=\"1514\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/07\/30181824\/ios-critical-vulnerabilities-124-update.png\" alt=\"\" style=\"width:360px\" class=\"aligncenter size-full wp-image-13795\"><\/a><\/p>\n<ul>\n<li>To keep posted on vulnerabilities in the software you\u2019re using, install <a href=\"https:\/\/me-en.kaspersky.com\/premium?icid=me-en_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">Kaspersky Premium<\/a>.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Six severe vulnerabilities in iMessage that allow remote code execution and data stealing with no user interaction? Sounds like a good reason to update to iOS 12.4 as soon as possible.<\/p>\n","protected":false},"author":421,"featured_media":13793,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1486],"tags":[2138,1061,26,426,683,268],"class_list":{"0":"post-13792","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-imessage","9":"tag-ios","10":"tag-iphone","11":"tag-mobile-devices","12":"tag-spying","13":"tag-vulnerabilities"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/ios-critical-vulnerabilities-124\/13792\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/ios-critical-vulnerabilities-124\/16284\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/ios-critical-vulnerabilities-124\/6392\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/ios-critical-vulnerabilities-124\/18295\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/ios-critical-vulnerabilities-124\/16370\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/ios-critical-vulnerabilities-124\/15057\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/ios-critical-vulnerabilities-124\/18984\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/ios-critical-vulnerabilities-124\/17717\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/ios-critical-vulnerabilities-124\/23240\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/ios-critical-vulnerabilities-124\/6283\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/ios-critical-vulnerabilities-124\/27778\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/ios-critical-vulnerabilities-124\/12058\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/ios-critical-vulnerabilities-124\/12138\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/ios-critical-vulnerabilities-124\/11024\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/ios-critical-vulnerabilities-124\/19849\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/ios-critical-vulnerabilities-124\/23807\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/ios-critical-vulnerabilities-124\/18757\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/ios-critical-vulnerabilities-124\/23099\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/ios-critical-vulnerabilities-124\/23039\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/ios\/","name":"iOS"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/13792","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/421"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=13792"}],"version-history":[{"count":6,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/13792\/revisions"}],"predecessor-version":[{"id":14383,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/13792\/revisions\/14383"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/13793"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=13792"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=13792"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=13792"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}