Project Zero Discovers Zero-Click Flaws in Apple Operating Systems

NJCCIC Advisory

Original Release Date: 5/1/2020

Summary

Researchers from Google’s Project Zero discovered six flaws in Apple’s multimedia processing component Image I/O, a framework responsible for parsing and working with image files. Image I/O ships with iOS, macOS, tvOS, and watchOS, and most apps running on these operating systems (OSs) rely on it for processing image metadata. Multimedia processing components, including Image I/O, are desirable attack surfaces because they do not require user interaction to run code on the targeted system, sometimes referred to as “zero-click” attacks. In addition to the Image I/O flaws, the researchers discovered eight bugs in Open EXR, an open-source library used for parsing EXR image files that come as a component with Image I/O. All of the discovered vulnerabilities have been patched. Researchers stressed that more research needs to be conducted into multimedia processing components.

Recommendations

The NJCCIC recommends users running Apple OSs ensure systems are updated to the latest vendor-supported patch levels. More information can be found in the Project Zero blog post.

New Jersey Cybersecurity & Communications Integration Cell

2 Schwarzkopf Dr, Ewing Township, NJ 08628

njccic@cyber.nj.gov

OUR COMMITMENT

The NJCCIC is a component organization within the New Jersey Office of Homeland Security and Preparedness. We are the State's one-stop-shop for cyber threat analysis, incident reporting, and information sharing and are committed to making New Jersey more resilient to cyber threats by spreading awareness and promoting the adoption of best practices.

Agency Seals of State of NJ, NJOHSP and NJCCIC

STAY CONNECTED:

View our Privacy Policy here.

View our Site Index here.