Apple iOS Masque Attack
Last Update Date:
17 Nov 2014 10:25
Release Date:
17 Nov 2014
3876
Views
RISK: High Risk
TYPE: Operating Systems - Mobile & Apps
Masque attack works by luring users to install an app from a source other than the iOS App Store or their organizations’ provisioning system. In order for the attack to succeed, a user must install an untrusted app, such as one delivered through a phishing link.
Impact
- Elevation of Privilege
- Security Restriction Bypass
- Information Disclosure
- Spoofing
System / Technologies affected
- iOS devices running iOS 7.1.1, 7.1.2, 8.0, 8.1, and 8.1.1 beta
Solutions
iOS users can protect themselves from Masque Attacks by following three steps:
- Don’t install apps from sources other than Apple’s official App Store or your own organization.
- Don’t click “Install” from a third-party pop-up when viewing a web page.
- When opening an app, if iOS shows an “Untrusted App Developer” alert, click on “Don’t Trust” and uninstall the app immediately.
Vulnerability Identifier
- No CVE information is available
Source
Related Link
Share with