Security News > 2023 > September > Apple zero-click iMessage exploit used to infect iPhones with spyware

Apple zero-click iMessage exploit used to infect iPhones with spyware
2023-09-07 20:18

Citizen Lab says two zero-days fixed by Apple today in emergency security updates were actively abused as part of a zero-click exploit chain to deploy NSO Group's Pegasus commercial spyware onto fully patched iPhones.

The two bugs, tracked as CVE-2023-41064 and CVE-2023-41061, allowed the attackers to infect a fully-patched iPhone running iOS 16.6 and belonging to a Washington DC-based civil society organization via PassKit attachments containing malicious images.

"We refer to the exploit chain as BLASTPASS. The exploit chain was capable of compromising iPhones running the latest version of iOS without any interaction from the victim," Citizen Lab said.

"The exploit involved PassKit attachments containing malicious images sent from an attacker iMessage account to the victim."

Apple and Citizen Lab security researchers discovered the two zero-days in the Image I/O and Wallet frameworks.

iPad Pro, iPad Air 3rd generation and later, iPad 5th generation and later, and iPad mini 5th generation and later.


News URL

https://www.bleepingcomputer.com/news/security/apple-zero-click-imessage-exploit-used-to-infect-iphones-with-spyware/

Related Vulnerability

DATE CVE VULNERABILITY TITLE RISK
2023-09-07 CVE-2023-41064 Classic Buffer Overflow vulnerability in Apple Ipados and Iphone OS
A buffer overflow issue was addressed with improved memory handling.
local
low complexity
apple CWE-120
7.8
2023-09-07 CVE-2023-41061 Unspecified vulnerability in Apple Ipados
A validation issue was addressed with improved logic.
local
low complexity
apple
7.8

Related vendor

VENDOR LAST 12M #/PRODUCTS LOW MEDIUM HIGH CRITICAL TOTAL VULNS
Apple 130 561 4078 1550 2432 8621