Researchers find new bug ‘class’ in Apple devices

freshidea – stock.adobe.com

A group of vulnerabilities in Apple products that stem from the ForcedEntry exploit used by spyware firm NSO constitutes a whole new class of bug, say researchers at Trellix

Alex Scroxton

By

Published: 22 Feb 2023 12:52

Researchers at Trellix have uncovered what they claim to be an entirely new class of privilege escalation vulnerability in Apple devices stemming from the infamous ForcedEntry exploit used by disgraced Israeli spyware manufacturer NSO Group to let its government customers target activists, journalists and political opponents.

The existence of ForcedEntry – CVE-2021-30860 – was disclosed in September 2021 by The Citizen Lab, an interdisciplinary laboratory based at the University of Toronto’s Munk School of Global Affairs and Public Policy in Canada, which was the first to expose NSO’s malfeasance earlier that summer.

But now, Trellix says its Advanced Research Centre vulnerability team has discovered a group of bugs in iOS and macOS that bypass the strengthened code-signing mitigations put in place by Apple to stop the exploitation of ForcedEntry.

Left unaddressed, these vulnerabilities – which range from medium to high severity carrying CVSS scores from 5.1 to 7.1, could allow a threat actor to access sensitive information on a target device, including but not limited to the victim’s messages, location data, call history and photos.

In Trellix’s disclosure notice, senior vulnerability researcher Austin Emmitt said the new bugs involve the NSPredicate tool used by developers to filter code, around which Apple tightened restrictions in the wake of the ForcedEntry fracas by introducing a protocol called NSPredicateVisitor.

“These mitigations used [a] large deny list to prevent the use of certain classes and methods that could clearly jeopardise security,” explained Emmitt.

“However, we discovered that these new mitigations could be bypassed. By using methods that had not been restricted, it was possible to empty these lists, enabling all the same methods that had been available before. This bypass was assigned CVE-2023-23530 by Apple.

“Even more significantly, we discovered that nearly every implementation of NSPredicateVisitor could be bypassed. This bypass was assigned CVE-2023-23531. These two techniques opened a huge range of potential vulnerabilities that we are still exploring.”

So far, the team has found multiple vulnerabilities within the new class of bugs, the first and most significant of which exists in a process designed to catalogue data about behaviour on Apple devices. If an attacker has achieved code execution capability in a process with the right entitlements, they could then use NSPredicate to execute code with the process’s full privilege, gaining access to the victim’s data.

Emmitt and his team also found other issues that could enable attackers with appropriate privileges to install arbitrary applications on a victim’s device, access and read sensitive information, and even wipe a victim’s device. Ultimately, all of the new bugs carry a similar level of impact to ForcedEntry.

Emmitt said the vulnerabilities constituted a “significant breach” of the macOS and iOS security models, which rely on individual applications having fine-grain access to the subset of resources needed, and querying services with more privileges to get anything else.

“Services that accept NSPredicate arguments and check them with insufficient NSPredicateVisitors allow malicious applications and exploit code to defeat process isolation and directly access far more resources than should be allowed. These issues were addressed with macOS 13.2 and iOS 16.3. We would like to thank Apple for working quickly with Trellix to fix these issues,” he wrote.

Fruitful interaction

Synopsys Cybersecurity Research Centre global research head Jonathan Knudsen said the outcome of the disclosures represented a “fruitful interplay” between researchers and Apple, which has been criticised before now for its approach to vulnerability disclosures and patching.

“Software must be built with security in mind at every phase, with the goal of finding and eliminating as many vulnerabilities as possible. Even when you do everything right, however, some vulnerabilities can still be present in the released software,” he said.

“Post-release, security researchers, both benevolent and malicious, might also discover vulnerabilities. Responding quickly to inbound security disclosures is critically important. Some organisations, including Apple, encourage security researchers to submit issues by providing incentives, typically called bug bounties. Recognising and engaging the security research community is an important component of a comprehensive software security initiative,” he said.

Read more on Data breach incident management and recovery

Read More
Larisa Pepper

Latest

RubyPlay partners with Caesars Entertainment in Ontario to advance North American expansion

RubyPlay, a studio-based content ecosystem, is further strengthening its presence in Ontario as part of its broader North American growth strategy with a new partnership with Caesars Entertainment. The partnership will see a curated selection of RubyPlay’s fan-favourite titles, including JMania® Lucky Pyggs, Mad Hit® Mr Coin and Diamond Explosion® 7s SE, made available on

Wizkid wins “Best African Music Act” at the 2026 MOBO Awards, beats Davido, Tyla, Rema

MusicRead Later (0)Please login to bookmark Close Nigerian superstar Wizkid...

Newsletter

Don't miss

RubyPlay partners with Caesars Entertainment in Ontario to advance North American expansion

RubyPlay, a studio-based content ecosystem, is further strengthening its presence in Ontario as part of its broader North American growth strategy with a new partnership with Caesars Entertainment. The partnership will see a curated selection of RubyPlay’s fan-favourite titles, including JMania® Lucky Pyggs, Mad Hit® Mr Coin and Diamond Explosion® 7s SE, made available on

Wizkid wins “Best African Music Act” at the 2026 MOBO Awards, beats Davido, Tyla, Rema

MusicRead Later (0)Please login to bookmark Close Nigerian superstar Wizkid...

South Block Continues Rapid Expansion Adding 24th Block in Burke, Virginia, March 28

MusicFirst 100 grand opening guests score free Mini...

Family Business? Tee Grizzley Reacts After His Mom Accuses Him Of Leaving Her To Struggle (PHOTOS)

Y’all… it looks like some family tension might be brewing behind the scenes involving Tee Grizzley and his mom. What seemed like a regular social media post quickly turned into something deeper. And now, folks are side-eyeing the situation and wondering what’s really going on. RELATED: Tee Grizzley Shares A Message For Artists After His

SoE necessary but not sufficient, business leaders say

PE­TER CHRISTO­PHER Se­nior Mul­ti­me­dia Re­porter pe­ter.christo­pher@guardian.co.tt Heavy hand­ed but nec­es­sary giv­en the state of crime in T&T. This was a com­mon as­sess­ment from var­i­ous busi­ness groups when asked for their per­spec­tive on the lat­est de­c­la­ra­tion of a state of emer­gency in the coun­try. The T&T Cham­ber of In­dus­try and Com­merce, in a re­leased is­sued yes­ter­day

The Big Business of Carolyn Bessette-Kennedy

Can a nine-episode limited series really impact an entire season of shopping trends? Today brands are experiencing—and chasing—the “Carolyn Bessette-Kennedy effect” as a result of Ryan Murphy’s Love Story. And in many cases, it’s more pervasive than they could have prepared for. The FX series, based on the relationship between John F. Kennedy Jr. and