Handling of Symlinks Improved to Address Security Risks
CVE-2024-44258

7.1HIGH

Key Information:

Vendor
Apple
Vendor
CVE Published:
28 October 2024

Badges

πŸ“ˆ TrendedπŸ“ˆ Score: 3,170πŸ‘Ύ Exploit Exists🟑 Public PoC

What is CVE-2024-44258?

CVE-2024-44258 is a security vulnerability found in Apple's operating systems, including iOS and iPadOS. This flaw relates to the improper handling of symbolic links (symlinks), which can be exploited through malicious backup files. When such files are restored, they may inadvertently modify protected system files, posing significant risks to users and organizations. This could lead to unauthorized alterations of critical data or system settings, ultimately compromising device integrity and security.

Technical Details

The vulnerability stems from the way symlinks are handled within the affected Apple operating systems. If a user restores a maliciously crafted backup file, the system may allow access to sensitive areas that should be restricted. This issue has been addressed in updates, specifically in versions 18.1 of iOS and iPadOS, as well as earlier versions like 17.7.1, visionOS 2.1, and tvOS 18.1. By improving symlink management, Apple has aimed to mitigate the risks associated with this vulnerability.

Impact of the Vulnerability

  1. Unauthorized System Modifications: The primary risk involves the potential alteration of protected system files, which could lead to unauthorized changes in system settings, configurations, or data integrity.

  2. Increased Attack Surface: The flaw expands the possibilities for attackers to exploit devices, especially if users are encouraged to restore backups from unreliable sources, putting organizational data at risk.

  3. Compromise of Sensitive Information: Sensitive information stored on affected devices may become vulnerable to exposure or corruption, leading to larger data security issues for organizations that rely on Apple's systems.

Affected Version(s)

iOS and iPadOS < 17.7

iOS and iPadOS < 18.1

tvOS < 18.1

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
7.1
Severity:
HIGH
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • πŸ“ˆ

    Vulnerability started trending

  • 🟑

    Public PoC available

  • πŸ‘Ύ

    Exploit known to exist

  • Vulnerability published

.