Apple issues a fix for Masque Attacks, but apps are still open to hack

Although Apple has fixed the Masque Attack there are still other attack scenarios that an attacker can exploit in the installation process on iOS.

A team of researchers at FireEye has revealed that the last update issued by Apple only partially fixed the two vulnerabilities exploited in the Masque Attack (CVE-2015-3722/3725, and CVE-2015-3725). The two exploits were dubbed by the experts Manifest Masque and Extension Masque and can be used to demolish mobile apps.

The experts explained that this vulnerability affects all iOS 7.x and iOS 8.x versions prior to iOS 8.4.

“In the recent release of iOS 8.4, Apple fixed several vulnerabilities, including vulnerabilities that allow attackers to deploy two new kinds of Masque Attack (CVE-2015-3722/3725, and CVE-2015-3725). We call these exploits Manifest Masque and Extension Masque, which can be used to demolish apps, including system apps (e.g., Apple Watch, Health, Pay and so on), and to break the app data container. In this blog, we also disclose the details of a previously fixed, but undisclosed, masque vulnerability: Plugin Masque, which bypasses iOS entitlement enforcement and hijacks VPN traffic.” wrote the blog post published by FireEye.

The experts also highlighted that around one-third of iOS devices still have not updated to versions 8.1.3 or above, leaving the devices open to the Masque Attacks.

Researchers Zhaofeng Chen, Tao Wei, Hui Xue, and Yulong Zhang provided the details a number of ‘app-demolishing’ Masque attacks, these malicious apps could be downloaded from the official App Store or can be part of a system app such as the Apple Pay or the Safary Browser.

Name Consequences disclosed till now Mitigation status
App Masque * Replace an existing app* Harvest sensitive data Fixed in iOS 8.1.3 [6]
URL Masque * Bypass prompt of trust* Hijack inter-app communication Partially fixed in iOS 8.1.3 [11]
Manifest Masque * Demolish other apps (incl. Apple Watch, Health, Pay, etc.) during over-the-air installations Partially fixed in iOS 8.4iOS 8.4
Plugin Masque * Bypass prompt of trust* Bypass VPN plugin entitlement* Replace an existing VPN plugin* Hijack device traffic

* Prevent device from rebooting

* Exploit more kernel vulnerabilities

Fixed in iOS 8.1.3
Extension Masque * Access another app’s data* Or prevent another app to access its own data Partially fixed in iOS 8.4iOS 8.4

“The Manifest Mmasque attack leverages the vulnerability (CVE-2015-3722, CVE-2015-3725) to demolish an existing app on iOS when a victim installs an in-house iOS app wirelessly using enterprise provisioning from a website,” states the post. “The demolished app can be either a regular app downloaded from official App Store or even an important system app, such as Apple Watch, Apple Pay, App Store, Safari, and Settings.

 

One of the attack scenarios detailed by the experts, the Plugin Masque allows executing Untrusted Code with Privilege including VPN-hijacking by replacing the VPN Plugin in affected devices.

“… this exploit is even more severe than the original Masque Attack,” states the experts. “The malicious code can be injected to the neagent process and can perform privileged operations, such as monitoring all VPN traffic, without the user’s awareness.”

“Our investigation also shows that around one third of iOS devices still have not updated to versions 8.1.3 or above, even five months after the release of 8.1.3, and these devices are still vulnerable to all the Masque attacks.”

Apple users should update their devices urgently.

Pierluigi Paganini

(Security Affairs –Masque attacks, mobile)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

MITRE revealed that nation-state actors breached its systems via Ivanti zero-days

The MITRE Corporation revealed that a nation-state actor compromised its systems in January 2024 by…

14 hours ago

FBI chief says China is preparing to attack US critical infrastructure

China-linked threat actors are preparing cyber attacks against U.S. critical infrastructure warned FBI Director Christopher…

1 day ago

United Nations Development Programme (UNDP) investigates data breach

The United Nations Development Programme (UNDP) has initiated an investigation into an alleged ransomware attack…

1 day ago

FIN7 targeted a large U.S. carmaker with phishing attacks

BlackBerry reported that the financially motivated group FIN7 targeted the IT department of a large…

2 days ago

Law enforcement operation dismantled phishing-as-a-service platform LabHost

An international law enforcement operation led to the disruption of the prominent phishing-as-a-service platform LabHost.…

2 days ago

Previously unknown Kapeka backdoor linked to Russian Sandworm APT

Russia-linked APT Sandworm employed a previously undocumented backdoor called Kapeka in attacks against Eastern Europe since…

2 days ago

This website uses cookies.