Apple has awarded a group of ethical hackers an amount of $300,000 for finding out 55 vulnerabilities in their company’s system. The group of hackers consisted of – Ben Sadeghipour, Tanner Barnes, Sam Curry, Samuel Erb, and Brett Buerhaus. They spent 3 months (from July 6th to October 6th) working on this and were successful in finding a total of 55 vulnerabilities. As of October 6th, 2020, the majority of these findings were fixed and credited. All the vulnerabilities were fixed within 1-2 business days also some were even fixed on the same day within 4-6 hours.
Sam Curry shared a blog post in which he shared, “During our engagement, we found a variety of vulnerabilities in core portions of their infrastructure that would’ve allowed an attacker to fully compromise both customer and employee applications, launch a worm capable of automatically taking over a victim’s iCloud account, retrieve source code for internal Apple projects, fully compromise an industrial control warehouse software used by Apple, and take over the sessions of Apple employees with the capability of accessing management tools and sensitive resources.”
Some of the critical vulnerabilities identified are as follows:
- Remote Code Execution via Authorization and Authentication Bypass.
- Memory Leak leads to Employee and User Account Compromise allowing access to various internal applications.
- Command Injection via Unsanitized Filename Argument.
- Remote Code Execution via Leaked Secret and Exposed Administrator Tool.
- Authentication Bypass via Misconfigured Permissions allows Global Administrator Access.
According to the hackers, Apple was very responsive to their reports. The turnaround for the most critical reports was only about 4 hours once the submission was done. Since many people don’t know much about Apple’s bug bounty program, so basically the hackers were going into unchartered territory with this kind of large time investment. Apple has a very intriguing record working with security researchers, but it seems like its vulnerability exposure program is a big step in the right direction. As of October 8th, they had received 32 payments totaling to $288,500 for various vulnerabilities they were able to identify.