	{"id":94562,"date":"2021-09-24T14:42:02","date_gmt":"2021-09-24T21:42:02","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=94562"},"modified":"2021-09-24T14:42:02","modified_gmt":"2021-09-24T21:42:02","slug":"researcher-discloses-several-zero-day-ios-ipados-vulnerabilities","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/researcher-discloses-several-zero-day-ios-ipados-vulnerabilities\/","title":{"rendered":"Researcher discloses several zero-day iOS, iPadOS vulnerabilities"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-94564\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/09\/privacy-thats-iphone-billboard-with-laughing-man-600x300-1.jpg\" alt=\"Privacy - That's iPhone billboard with laughing man meme superimposed.\" width=\"600\" height=\"300\" \/><\/p>\n<p>An iOS security researcher has <a href=\"https:\/\/habr.com\/en\/post\/579714\/\">publicly disclosed<\/a> three zero-day vulnerabilities in Apple&#8217;s mobile operating systems\u2014and a fourth that is unmitigated in iOS 15.<\/p>\n<p>The researcher, who went by the pseudonym &#8220;illusionofchaos&#8221; in their disclosure, stated that they had privately reported these vulnerabilities to Apple months ago. Since Apple has failed to fix the issues within a reasonable timeframe, the researcher decided to take the details public.<\/p>\n<p>Full public disclosure is a two-edged sword. Although it potentially puts users at risk from malicious developers learning about and implementing these techniques, it also pushes Apple to quickly patch the issues. Given the possibility that malicious developers might have already discovered and used these techniques without anyone&#8217;s awareness, one can begin to understand why public disclosure might seem like a practical option after Apple seemingly ignored the vulnerabilities for months.<\/p>\n<p>So just how bad are these vulnerabilities? All four are &#8220;information disclosure&#8221; issues, meaning that a malicious developer could potentially leverage them to obtain sensitive information about a user without their knowledge or permission. Following is a brief summary of each of the four issues, which affect both iOS devices (iPhone and iPod touch) as well as iPadOS devices (iPad).<\/p>\n<h3>The &#8220;gamed&#8221; zero-day<\/h3>\n<p>The Game Center process\u2014formally known as <code>com.apple.gamed<\/code> or just gamed\u2014can be exploited by any App Store app to obtain the following information about the user:<\/p>\n<ul>\n<li>The user&#8217;s full name associated with their Apple ID<\/li>\n<li>The user&#8217;s Apple ID e-mail address<\/li>\n<li>An Apple ID authentication token &#8220;which allows to access at least one of the endpoints on *.apple.com on behalf of the user&#8221;<\/li>\n<li>Full access to read the contents of the &#8220;Core Duet&#8221; database, which &#8220;contains a list of contacts from Mail, SMS, iMessage, third-party messaging apps and metadata about all user&#8217;s interaction with these contacts (including timestamps and statistics),&#8221; and &#8220;also some attachments (like URLs and texts)&#8221;<\/li>\n<li>Full access to read the contents of the Speed Dial database and the Address Book database, including photos of contacts<\/li>\n<\/ul>\n<p>The researcher notes that access to the Speed Dial and Address Book databases were evidently revoked silently in iOS 15. However, the other issues remain.<\/p>\n<h3>The &#8220;nehelper enumerate installed apps&#8221; zero-day<\/h3>\n<p>The Network Extension helper XPC service\u2014<code>com.apple.nehelper<\/code> or nehelper\u2014contains a vulnerability that allows any app to identify which other apps are installed on the device, determined by the apps&#8217; bundle ID.<\/p>\n<p>Although this vulnerability may not sound like a big deal, it could actually reveal plenty of things about users that they would not knowingly reveal about themselves to app developers. For example, simply knowing which apps you have installed could reveal your sexual preferences (based on dating apps you have installed), your political or religious views, which bank or credit union you use, where you work or go to school, where you shop or travel, and much more.<\/p>\n<h3>The &#8220;nehelper Wi-Fi info&#8221; zero-day<\/h3>\n<p>The same service also has a vulnerability that could reveal information about the Wi-Fi network to which you are connected. This can include both the name of the network (SSID) as well as the unique BSSID MAC address of your Wi-Fi router.<\/p>\n<p>Searchable databases of BSSIDs are easy to find online. If someone can find out your BSSID, they can pinpoint precisely where you are on earth (within the radius of that particular Wi-Fi network&#8217;s range).<\/p>\n<h3>The analyticsd vulnerability (unmitigated in iOS 15)<\/h3>\n<p>The fourth vulnerability was fixed back in iOS 14.7, but Apple never publicly acknowledged this.<\/p>\n<p>However, illusionofchaos says that <strong>the vulnerability has returned in iOS 15.<\/strong> (Intego reported earlier this week that <strong><a href=\"https:\/\/www.intego.com\/mac-security-blog\/why-doesnt-apple-want-people-to-upgrade-to-ios-15\/#which-is-more-secure\">iOS 15 seems to be missing patches for two in-the-wild vulnerabilities<\/a><\/strong> that were addressed a week earlier in iOS 14.8. It may be advisable to stay on the latest iOS 14 update until Apple addresses these issues in a future release of iOS 15.)<\/p>\n<p>The vulnerability is that <strong>any app<\/strong> can access <strong>all<\/strong> of the Analytics Data that Apple collects about you on your device. Apple stores these analytics logs even if you have &#8220;Share iPhone &amp; Watch Analytics&#8221; disabled. You can see the very long list of Analytics Data files on your own iOS or iPadOS device by going to <strong>Settings &gt; Privacy &gt; Analytics &amp; Improvements &gt; Analytics Data<\/strong>.<\/p>\n<p>The researcher notes that this Analytics Data can include sensitive information about the user, including but not limited to:<\/p>\n<ul>\n<li>Medical information (heart rate, count of detected afib and irregular heart rhythm events, menstrual cycle length, cervical mucus quality, etc.)<\/li>\n<li>The user&#8217;s age, biological gender, and known languages<\/li>\n<li>Whether the user is logging sexual activity<\/li>\n<li>The manufacturer, model, firmware version, and user-assigned names of any accessory devices<\/li>\n<li>App crash logs (which might reveal additional sensitive information)<\/li>\n<\/ul>\n<p>Again, since this particular issue is fixed in iPadOS and iOS 14.8, <strong>it may be best to wait to upgrade to iPadOS or iOS 15<\/strong> until Apple fixes this for the latest operating system as well.<\/p>\n<p>The other three vulnerabilities, however, remain zero-day issues\u2014unpatched regardless of which iOS or iPadOS version you have installed.<\/p>\n<h3>How can I learn more?<\/h3>\n<p>For the full details, you can read illusionofchaos&#8217;s full disclosure posts in <a href=\"https:\/\/habr.com\/en\/post\/579714\/\" target=\"_blank\" rel=\"noopener\">English<\/a> and <a href=\"https:\/\/habr.com\/en\/post\/579716\/\" target=\"_blank\" rel=\"noopener\">Russian<\/a>.<\/p>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" target=\"_blank\" rel=\"noopener noreferrer\"><img class=\"alignleft\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" alt=\"\" width=\"80\" \/><\/a>We&#8217;ll discuss these vulnerabilities on an upcoming episode of the <a href=\"https:\/\/podcast.intego.com\/\"><strong>Intego Mac Podcast<\/strong><\/a>. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\">follow the podcast<\/a> to make sure you don\u2019t miss any episodes! You\u2019ll also want to subscribe to our <strong>e-mail newsletter<\/strong> and keep an eye here on <strong>The Mac Security Blog<\/strong> for the latest Apple security and privacy news.<\/p>\n<p>Be sure to follow Intego on your favorite social media channels: <a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>, <a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener noreferrer\">Instagram<\/a>, <a href=\"https:\/\/twitter.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>, and <a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener noreferrer\">YouTube<\/a> (click the \ud83d\udd14 to get notified about new videos).<\/p>\n","protected":false},"excerpt":{"rendered":"<p>An iOS security researcher has publicly disclosed three zero-day vulnerabilities in Apple&#8217;s mobile operating systems\u2014and a fourth that is unmitigated in iOS 15. The researcher, who went by the pseudonym &#8220;illusionofchaos&#8221; in their disclosure, stated that they had privately reported these vulnerabilities to Apple months ago. Since Apple has failed to fix the issues within [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":94566,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[4627,143,982],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"An iOS security researcher has publicly disclosed three zero-day vulnerabilities in Apple&#039;s mobile operating systems\u2014and a fourth that is unmitigated in\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/researcher-discloses-several-zero-day-ios-ipados-vulnerabilities\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Researcher discloses several zero-day iOS, iPadOS vulnerabilities - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"An iOS security researcher has publicly disclosed three zero-day vulnerabilities in Apple&#039;s mobile operating systems\u2014and a fourth that is unmitigated in\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/researcher-discloses-several-zero-day-ios-ipados-vulnerabilities\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-24T21:42:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/09\/privacy-thats-iphone-billboard-with-laughing-man-400x260-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/researcher-discloses-several-zero-day-ios-ipados-vulnerabilities\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/09\/privacy-thats-iphone-billboard-with-laughing-man-400x260-1.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/09\/privacy-thats-iphone-billboard-with-laughing-man-400x260-1.jpg\",\"width\":400,\"height\":260,\"caption\":\"Privacy - That's iPhone billboard with laughing man meme superimposed\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/researcher-discloses-several-zero-day-ios-ipados-vulnerabilities\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/researcher-discloses-several-zero-day-ios-ipados-vulnerabilities\/\",\"name\":\"Researcher discloses several zero-day iOS, iPadOS vulnerabilities - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/researcher-discloses-several-zero-day-ios-ipados-vulnerabilities\/#primaryimage\"},\"datePublished\":\"2021-09-24T21:42:02+00:00\",\"dateModified\":\"2021-09-24T21:42:02+00:00\",\"description\":\"An iOS security researcher has publicly disclosed three zero-day vulnerabilities in Apple's mobile operating systems\\u2014and a fourth that is unmitigated in\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/researcher-discloses-several-zero-day-ios-ipados-vulnerabilities\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/researcher-discloses-several-zero-day-ios-ipados-vulnerabilities\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/researcher-discloses-several-zero-day-ios-ipados-vulnerabilities\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Researcher discloses several zero-day iOS, iPadOS vulnerabilities\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/researcher-discloses-several-zero-day-ios-ipados-vulnerabilities\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/researcher-discloses-several-zero-day-ios-ipados-vulnerabilities\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"Researcher discloses several zero-day iOS, iPadOS vulnerabilities\",\"datePublished\":\"2021-09-24T21:42:02+00:00\",\"dateModified\":\"2021-09-24T21:42:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/researcher-discloses-several-zero-day-ios-ipados-vulnerabilities\/#webpage\"},\"wordCount\":927,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/researcher-discloses-several-zero-day-ios-ipados-vulnerabilities\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/09\/privacy-thats-iphone-billboard-with-laughing-man-400x260-1.jpg\",\"keywords\":[\"iOS 15\",\"Vulnerabilities\",\"Zero Day\"],\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/researcher-discloses-several-zero-day-ios-ipados-vulnerabilities\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"An iOS security researcher has publicly disclosed three zero-day vulnerabilities in Apple's mobile operating systems\u2014and a fourth that is unmitigated in","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/researcher-discloses-several-zero-day-ios-ipados-vulnerabilities\/","og_locale":"en_US","og_type":"article","og_title":"Researcher discloses several zero-day iOS, iPadOS vulnerabilities - The Mac Security Blog","og_description":"An iOS security researcher has publicly disclosed three zero-day vulnerabilities in Apple's mobile operating systems\u2014and a fourth that is unmitigated in","og_url":"https:\/\/www.intego.com\/mac-security-blog\/researcher-discloses-several-zero-day-ios-ipados-vulnerabilities\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2021-09-24T21:42:02+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/09\/privacy-thats-iphone-billboard-with-laughing-man-400x260-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/researcher-discloses-several-zero-day-ios-ipados-vulnerabilities\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/09\/privacy-thats-iphone-billboard-with-laughing-man-400x260-1.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/09\/privacy-thats-iphone-billboard-with-laughing-man-400x260-1.jpg","width":400,"height":260,"caption":"Privacy - That's iPhone billboard with laughing man meme superimposed"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/researcher-discloses-several-zero-day-ios-ipados-vulnerabilities\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/researcher-discloses-several-zero-day-ios-ipados-vulnerabilities\/","name":"Researcher discloses several zero-day iOS, iPadOS vulnerabilities - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/researcher-discloses-several-zero-day-ios-ipados-vulnerabilities\/#primaryimage"},"datePublished":"2021-09-24T21:42:02+00:00","dateModified":"2021-09-24T21:42:02+00:00","description":"An iOS security researcher has publicly disclosed three zero-day vulnerabilities in Apple's mobile operating systems\u2014and a fourth that is unmitigated in","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/researcher-discloses-several-zero-day-ios-ipados-vulnerabilities\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/researcher-discloses-several-zero-day-ios-ipados-vulnerabilities\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/researcher-discloses-several-zero-day-ios-ipados-vulnerabilities\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Researcher discloses several zero-day iOS, iPadOS vulnerabilities"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/researcher-discloses-several-zero-day-ios-ipados-vulnerabilities\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/researcher-discloses-several-zero-day-ios-ipados-vulnerabilities\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"Researcher discloses several zero-day iOS, iPadOS vulnerabilities","datePublished":"2021-09-24T21:42:02+00:00","dateModified":"2021-09-24T21:42:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/researcher-discloses-several-zero-day-ios-ipados-vulnerabilities\/#webpage"},"wordCount":927,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/researcher-discloses-several-zero-day-ios-ipados-vulnerabilities\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/09\/privacy-thats-iphone-billboard-with-laughing-man-400x260-1.jpg","keywords":["iOS 15","Vulnerabilities","Zero Day"],"articleSection":["Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/researcher-discloses-several-zero-day-ios-ipados-vulnerabilities\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/09\/privacy-thats-iphone-billboard-with-laughing-man-400x260-1.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-oBc","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/94562"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=94562"}],"version-history":[{"count":11,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/94562\/revisions"}],"predecessor-version":[{"id":94579,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/94562\/revisions\/94579"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/94566"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=94562"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=94562"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=94562"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}