Kaspersky/Securelist researchers detail zero-click iPhone exploit involving four distinct zero-day vulnerabilities, including undocumented hardware features in iPhone chips
JATth @ JATtho @lemmy.world Posts 2Comments 123Joined 2 yr. ago
JATth @ JATtho @lemmy.world
Posts
2
Comments
123
Joined
2 yr. ago
The attack is spread via iMessage. A vulnerable device merely needs to receive a bad message with PDF attachment. --> A Remote code execution. No user interaction.
Yikes. Indeed.
The attack entry point is via bad TrueType font + PDF attachment that only needs to processed once. Once a process touches that, the attack vector begins and exploits are chained until they get kernel mode access. After getting kernel mode access all hope is lost, the attacker owns the device.
Only sliver of hope is that fixing the attack entry point blocks the current attack. And that bug is:
But unless all the CVEs are patched, it is just matter of time a new attack entry point is found.