Skip to content Skip to footer
0 items - $0.00 0

How a single line of code could brick your iPhone by sashk

How a single line of code could brick your iPhone by sashk

7 Comments

  • Post Author
    _rrnv
    Posted April 27, 2025 at 8:41 pm

    Great work! This is my favourite type of vulnerability, simple, effective and brutal. Reminds me of a time two decades ago when with a friend from uni we theorised about a perfect server vulnerability where you’d exploit a machine by pinging it. And of course, two years ago it was in fact discovered as CVE-2022-23093.

  • Post Author
    dado3212
    Posted April 27, 2025 at 8:43 pm

    Neat, $17,500 is pretty good, I’m so used to these blog posts being for peanuts, or where companies fix the vulnerability but don’t pay out at all. Apple’s gotten better about this since 2019.

  • Post Author
    shrx
    Posted April 27, 2025 at 9:06 pm

    > Looking into the binaries, SpringBoard was observing that notification to trigger the UI. The notification is triggered when the device is being restored from a local backup via a connected computer, but as established before, any process could send the notification and trick the system into entering that mode.

    This should probably be reworked regardless if the patch described in the article was implemented.

  • Post Author
    jonplackett
    Posted April 27, 2025 at 9:16 pm

    Anyone know how long ago that system would have been introduced?

    It seems like such an obvious security concern. Maybe it was pre-AppStore? And more assumed trust in other apps?

  • Post Author
    brcmthrowaway
    Posted April 27, 2025 at 9:30 pm

    Ultimately, does this require installing a sketchy app in the first place?

  • Post Author
    urbandw311er
    Posted April 27, 2025 at 10:05 pm

    Nice. I can only imagine what a crap day in the office it was when the iOS core team reviewed that one.

  • Post Author
    doesnt_know
    Posted April 27, 2025 at 10:42 pm

    I get that it's potentially lower priority since a user needs to actively install a malicious app, but that timeline doesn't exactly feel me with confidence…

Leave a comment

In the Shadows of Innovation”

© 2025 HackTech.info. All Rights Reserved.

Sign Up to Our Newsletter

Be the first to know the latest updates

Whoops, you're not connected to Mailchimp. You need to enter a valid Mailchimp API key.