Apple users are Vulnerable to the Sandbox Vulnerability ! Penetration Testing Smartphones !
Well Sandbox Vulnerability is not new and has been here for a while . So this is no news .This artical is for the security enthusiasts who want to know more about IOS hacking . Apple Devices have been known to be more secure and stable than any other Smartphone OS including Android .
Mobile Security Experts have found out that the sandbox vulnerability affects all apps that are using the managed app configuration setting in devices that run older versions of iOS.Though Apple has fixed the bug now but you might still find many older version devices out there that may be vulnerable to Sandbox Vulnerability during penetration Tests .
Apple Users with the iOS version older than iOS 8.4.1 are affected by the sandbox vulnerability, CVE-2015-3269. The flaw affects all apps that use the managed app configuration settings, meaning that Apple is storing enterprise credentials in a directory that can be read by everyone.
Impact of Sandbox Vulnerability on Apple IOS Users :
Sandbox Vulnerability basically affects Apple iOS users with an iOS version older than iOS 8.4.1 . The vulnerability will commonly send the credential and authentication information along with the managed app binary for installation on corporate mobile devices which often included access to the corporate data security jewels, including server URLs, and credentials with plaintext passwords. Hence this makes the penetration testing of Organization more needed as Apple I phones are Common among the cooperates and used for accessing organization sensitiv
e data .
Digging Deeper Into Sandbox Vulnerability !
The underlying issue with our critical sandbox violation discovery is that anyone can also see the credential information on the mobile device as it is stored world readable. Not even encrypted or Hashed .
Impact on Enterprises of Apple Sandbox Vulnerability
Hackers can target as many organizations as it can get into using the iTunes store to spread an app designed to read and share the configuration files . The specific targets can be exploited for the Sandbox Vulnerability using spear-phishing attack by using targeted e-mails. In either case, they would develop an app that has a high chance of being installed in the enterprise, such as a productivity app. Once the app gets downloaded and installed on the devices, it would continuously monitor the directory for configuration settings being written to the world readable directory, harvesting and sending them to the attacker. Because all apps have access to the directory, it could hide in plain sight and operate as one of the many legitimate apps that have access to the directory in question.
The attacker with access to an MDM managed device can read all managed configuration settings for an unpatched device. Managed configuration is used to make the provisioning of apps easier and enterprise apps may use this mechanism to provision credentials or details about internal infrastructure this way. Those can be used by the attacker to gain access to those services.
Corporate app data are more exposed, the expert highlighted the risk of a cyber attack that can allow hackers to steal information stored in an open directory including mobile device management .
Hence this comes as a treat for Corporate Espionage . We suggest that you update the iOS versions to the latest . Also a penetration testing of the Enterprise is very good in this case as it will help identify the loopholes .