sb-eu logo
Story image

Apple confirms that macOS and iOS are vulnerable to Meltdown bugs

Security researchers have recently uncovered security issues known by two names, Meltdown and Spectre. 

These issues apply to all modern processors and affect nearly all computing devices and operating systems. 

All Mac systems and iOS devices are affected, but there are no known exploits impacting customers at this time. 

Since exploiting many of these issues requires a malicious app to be loaded on your Mac or iOS device, they recommend downloading software only from trusted sources such as the App Store. 

Apple has already released mitigations in iOS 11.2, macOS 10.13.2, and tvOS 11.2 to help defend against Meltdown. 

Apple Watch is not affected by either Meltdown or Spectre. 

Meltdown is a name given to an exploitation technique known as CVE-2017-5754 or rogue data cache load.

The Meltdown technique can enable a user process to read kernel memory. 

Apple analysis suggests that it has the most potential to be exploited. 

Apple released mitigations for Meltdown in iOS 11.2, macOS 10.13.2, and tvOS 11.2. 

Their testing with public benchmarks has shown that the changes in the December 2017 updates resulted in no measurable reduction in the performance of macOS and iOS as measured by the GeekBench 4 benchmark, or in common Web browsing benchmarks such as Speedometer.

Spectre is a name covering two different exploitation techniques known as CVE-2017-5753 or bounds check bypass, and CVE-2017-5715 or branch target injection.

These techniques potentially make items in kernel memory available to user processes by taking advantage of a delay in the time it may take the CPU to check the validity of a memory access call.

Analysis of these techniques revealed that while they are extremely difficult to exploit, even by an app running locally on a Mac or iOS device, they can be potentially exploited in JavaScript running in a web browser. 

Apple has promised to release an update for Safari on macOS and iOS in the coming days to mitigate these exploit techniques. 

Their current testing indicates that the upcoming Safari mitigations will have no measurable impact on the Speedometer and ARES-6 tests and an impact of less than 2.5% on the JetStream benchmark. 

They say they will continue to develop and test further mitigations within the operating system for the Spectre techniques and will release them in upcoming updates of iOS, macOS, and tvOS.

Story image
Bitglass receives US patent for SAML technology
Bitglass designed its SAML relay to allow a cloud access security broker (CASB) to be inserted into the traffic flow between users and cloud services during the login process.More
Story image
Check Point acquires Odo Security to bolster remote security offering
The deal will integrate Odo’s remote access software with Check Point’s Inifinity architecture, bolstering the latter company’s remote security capabilities in a time where working and learning from home has become the norm, and looks to largely remain that way in the near future.More
Story image
Research: 61% of companies have suffered an insider attack in last 12 months
It comes as rapid migration to cloud and remote working and BYOD scenarios leave organisations increasingly vulnerable to insider attacks as a result of the upheaval caused by the COVID-19 pandemic.More
Story image
Kaspersky releases new report on consumer’s approach to digital services
COVID-19 related restrictions and the necessity to stay indoors has influenced the way people approach digital services, making them more aware of how securely both they, and their housemates, use the internet.More
Story image
Shlayer malware proves Apple devices aren't as secure as you think
"Apple never talks about malware publicly, and loves to give the impression that its systems are secure. Unfortunately, the opposite has been proven to be the case with great regularity."More
Story image
California's CCPA now enforced worldwide
“The expansive reach of the CCPA and scope of data it covers can make compliance feel daunting to many,” comments ISACA Privacy Group member David Bowden.More