TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

How a single line of code could brick your iPhone

501 点作者 sashk24 天前

18 条评论

e28eta24 天前
I’m fascinated that they aren’t requiring an entitlement for all usage of setting &amp; posting notifications through this API. A way to share 64 bits of information (at a time) to any process on the device? That is <i>right</i> in the wheelhouse of tracking a user across apps.<p>I don’t specifically know the types of things that you’d want to share across apps, but there’s a long history of cross process information channels being removed or restricted.<p>If the system is storing values for you, and isn’t keeping track of which app they came from, now you’ve got persistent storage across app deletion &amp; re-install, as long as there isn’t a reboot in between.<p>I think you could easily use it to work around IDFA or IDFV resets, as a simple example.
评论 #43818527 未加载
评论 #43818653 未加载
评论 #43819587 未加载
评论 #43822727 未加载
95014_refugee24 天前
The exploit as described doesn&#x27;t &quot;brick&quot; the device; that would require permanently disabling it. A tethered restore would be all that&#x27;s required to recover in this case.
评论 #43818752 未加载
评论 #43816330 未加载
评论 #43816408 未加载
评论 #43817183 未加载
评论 #43823757 未加载
评论 #43817292 未加载
dado321224 天前
Neat, $17,500 is pretty good, I’m so used to these blog posts being for peanuts, or where companies fix the vulnerability but don’t pay out at all. Apple’s gotten better about this since 2019.
评论 #43815283 未加载
评论 #43817320 未加载
_rrnv24 天前
Great work! This is my favourite type of vulnerability, simple, effective and brutal. Reminds me of a time two decades ago when with a friend from uni we theorised about a perfect server vulnerability where you’d exploit a machine by pinging it. And of course, two years ago it was in fact discovered as CVE-2022-23093.
评论 #43815221 未加载
评论 #43815704 未加载
urbandw311er24 天前
Nice. I can only imagine what a crap day in the office it was when the iOS core team reviewed that one.
rashkov23 天前
Seems like this should have been obvious to someone on the iOS team, no?<p>Like, &quot;hey we need a way to trigger springboard UI events..&quot; &quot;ok let&#x27;s just use this unauthenticated bus and have springboard subscribe to it&quot;<p>Something like that? Only thing I can think of is that this line of code was written so long ago and it&#x27;s way at the bottom of the abstraction stack, so no one had a look
jonplackett24 天前
Anyone know how long ago that system would have been introduced?<p>It seems like such an obvious security concern. Maybe it was pre-AppStore? And more assumed trust in other apps?
评论 #43815433 未加载
评论 #43816913 未加载
andrekandre24 天前
<p><pre><code> &gt; That single line of code was enough to make the device enter “Restore in Progress”. &gt; as established before, any process could send the notification and trick the system into entering that mode. </code></pre> sleep data, sleep...
moduspol24 天前
Doesn&#x27;t this imply that third-party apps with their own notification schemes could be impersonated similarly? They wouldn&#x27;t be able to brick the phone, obviously, but they could potentially trigger other actions.
cryptonector23 天前
This reminds me of how there is zero authorization for `NOTIFY` in PostgreSQL. IMO there should at least be the option to `CREATE CHANNEL ...` and then use `GRANT` to indicate who can `NOTIFY`.<p>In practice this is not a big problem because usually one grants very few users direct access to a PG DB.
gitroom24 天前
Damn, makes me miss those old IRC days but also, stuff like this just reminds me how risky even tiny changes can be on any tech. You think security ever gets ahead or we just keep patching leaks forever?
评论 #43819014 未加载
doesnt_know24 天前
I get that it&#x27;s potentially lower priority since a user needs to actively install a malicious app, but that timeline doesn&#x27;t exactly feel me with confidence...
kvetching23 天前
In general, the vulnerability of our computers is major national security concern as we enter in the era of AGI. This administration needs to setup a system hardening commission. In the era of AI... if we aren&#x27;t using the leading AI to hack our own systems first, then when the capability to use the latest models to hack is widely available, we are going to have a bad time.
Loocid24 天前
The sheer simplicity of this exploit is wild.
brcmthrowaway24 天前
Ultimately, does this require installing a sketchy app in the first place?
评论 #43815616 未加载
评论 #43815513 未加载
评论 #43815307 未加载
keepamovin24 天前
This was an epic read. That very old skool API was so powerful! Cool demo seeing it trigger all this low-level states for iOS. I wonder what happened to notify_post now..
shrx24 天前
&gt; Looking into the binaries, SpringBoard was observing that notification to trigger the UI. The notification is triggered when the device is being restored from a local backup via a connected computer, but as established before, any process could send the notification and trick the system into entering that mode.<p>This should probably be reworked regardless if the patch described in the article was implemented.
pmlnr24 天前
I wonder if this can be &quot;ported&quot; to dbus, udev, or devd.