Skip to main content

Apple iOS Masque Attack

Last Update Date: 17 Nov 2014 10:25 Release Date: 17 Nov 2014 3300 Views

RISK: High Risk

TYPE: Operating Systems - Mobile & Apps

TYPE: Mobile & Apps

Masque attack works by luring users to install an app from a source other than the iOS App Store or their organizations’ provisioning system. In order for the attack to succeed, a user must install an untrusted app, such as one delivered through a phishing link.


Impact

  • Elevation of Privilege
  • Security Restriction Bypass
  • Information Disclosure
  • Spoofing

System / Technologies affected

  •  iOS devices running iOS 7.1.1, 7.1.2, 8.0, 8.1, and 8.1.1 beta

Solutions

iOS users can protect themselves from Masque Attacks by following three steps:

  1. Don’t install apps from sources other than Apple’s official App Store or your own organization.
  2. Don’t click “Install” from a third-party pop-up when viewing a web page.
  3. When opening an app, if iOS shows an “Untrusted App Developer” alert, click on “Don’t Trust” and uninstall the app immediately.

Vulnerability Identifier

  • No CVE information is available

Source


Related Link