
an attacker to exploit other vulnerabilities within the AP Kernel. Jamf says that ColdInvite just gets an attacker closer to being able to take over the iPhone. While the phrase “an application may be able to execute arbitrary code with kernel privileges” can be code for “a rogue app can do anything it likes to the phone,” that isn’t the case here. Jamf reported this to Apple, and the company applied fixed the vulnerability itself in iOS 16.5. The attack begins by gaining access to the Display Co-Processor (DCP), and then uses this to gain access to the Application Processor (AP).Īnalysis revealed that Apple had not blocked the underlying vulnerability which made such attacks possible. The link was to a fake version of the app, which contained the malware.
#VSEE APP FOR IPAD INSTALL#
The attacker then sent a fake message to the victim asking them to install the My Vodafone app (a genuine app) in order to restore the plan. In one example, an attacker managed to fool mobile carrier Vodafone into disabling the plan of a target. These fresh attacks used a variation on ColdIntro, named ColdInvite.

Unfortunately, while Apple blocked the specific attack route used by ColdIntro, security researchers at both Jamf and Google’s Project Zero saw similar attacks succeeding even after the update. This was indeed actively exploited by an attack dubbed ColdIntro. Apple is aware of a report that this issue may have been actively exploited. Impact: An application may be able to execute arbitrary code with kernel privileges.
#VSEE APP FOR IPAD UPDATE#
When Apple released iOS 15.6.1 in August 2022, the company said that the update “provides important security updates and is recommended for all users.” But it’s now been revealed that the more serious vulnerability wasn’t closed after all.Īpple did succeed in blocking a specific way of exploiting the vulnerability, but didn’t address the root issue until last week’s iOS 16.5 update, some nine months later … Last year’s Apple security fix An Apple security fix in iOS 15.6.1 back in August of last year was said to close two major security vulnerabilities, one of which could have allowed a rogue app to execute arbitrary code with kernel privileges (aka do Very Bad Things).
