Mobile

Over 50 iOS 8 Mobile Security Holes Fixed

The specs of the new mobile operating system release from Apple Wednesday (Sept. 17) disclose 53 security vulnerabilities—all supposedly fixed—including some that would have allowed “an attacker to execute code on the device with root privileges,” ZDNet is reporting.

“Several other (iOS security holes) allow execution of code with kernel or system privileges. These vulnerabilities require the ability to execute code on the device, but that could be accomplished with one of the many remote code execution vulnerabilities also disclosed. Many of these are in the Webkit browser engine, meaning that such an attack could be launched if the user visited a malicious web page,” the ZDNet story said. “These issues, many of them severe, remain in earlier versions of iOS. It is Apple’s usual practice not to fix them on earlier versions, so users who remain on iOS 7.x remain vulnerable to these issues.”

Some of the holes involve settings that defaulted to non-secure choices. “Less shocking, but still severe is the ability for a rogue access point to steal iOS Wi-Fi credentials using an old and broken authentication protocol which was on by default in iOS. The protocol (LEAP) is disabled by default in iOS 8,” the story said. “Another bug could allow an attacker with write access to /tmp to install unverified apps. Several vulnerabilities allow an app to turn the device off or restart it.”

——————————–

Latest Insights: 

With an estimated 64 million connected cars on the road by year’s end, QSRs are scrambling to win consumer drive-time dollars via in-dash ordering capabilities, while automakers like Tesla are developing new retail-centric charging stations. The PYMNTS Commerce Connected Playbook explores how the connected car is putting $230 billion worth of connected car spend into overdrive.

Click to comment

TRENDING RIGHT NOW

To Top