After finding out about Apple’s Bug Bounty Program, a group of security researchers — Sam Curry, Brett Buerhaus, Ben Sadeghipour, Samuel Erb, and Tanner Barnes — worked together and hacked Apple from July 6, 2020 to October 6, 2020. Here’s what they found.
During our engagement, we found a variety of vulnerabilities in core portions of their infrastructure that would’ve allowed an attacker to fully compromise both customer and employee applications, launch a worm capable of automatically taking over a victim’s iCloud account, retrieve source code for internal Apple projects, fully compromise an industrial control warehouse software used by Apple, and take over the sessions of Apple employees with the capability of accessing management tools and sensitive resources.
There were a total of 55 vulnerabilities discovered with 11 critical severity, 29 high severity, 13 medium severity, and 2 low severity reports. These severities were assessed by us for summarization purposes and are dependent on a mix of CVSS and our understanding of the business related impact.
As of October 6th, 2020, the vast majority of these findings have been fixed and credited. They were typically remediated within 1-2 business days (with some being fixed in as little as 4-6 hours).
As of now, October 4th, we have received four payments totaling $51,500… However, it appears that Apple does payments in batches and will likely pay for more of the issues in the following months.
MacDailyNews Take: Thanks to white hat hackers like these guys, Apple’s products, systems, and services get ever more secure!
There’s tons more, including several vulnerability write-ups, in the full article.
[Attribution: AppleInsider. Thanks to MacDailyNews Readers “Fred Mertz” and “Brawndo Drinker” for the heads up.]