lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <wsDqJnjEbDZObdaDBCD071CCG1Zst3_g-hCIWkwXRfT2khobwMtG62mkzC_iRCdGDP5FIYqqY4bwCK-G43tJKuYDmmBbtYhDyW4YoysJnqI=@proton.me>
Date: Thu, 26 Jun 2025 06:11:49 +0000
From: josephgoyd via Fulldisclosure <fulldisclosure@...lists.org>
To: "fulldisclosure@...lists.org" <fulldisclosure@...lists.org>
Subject: [FD] iOS Activation Flaw Enables Pre-User Device Compromise and
	Identity Exposure (iOS 18.5)

Title: iOS Activation Flaw Enables Pre-User Device Compromise

Reported to Apple: May 19, 2025
Reported to US-CERT: May 19, 2025
US-CERT Case #: VU#346053
Vendor Status: Silent
Public Disclosure: June 26, 2025

------------------------------------------------------------------------
Summary
------------------------------------------------------------------------

A critical vulnerability exists in Apple’s iOS activation pipeline that
allows remote XML payload injection *before* the user ever interacts
with the device.

During factory setup, iPhones contact:

https://humb.apple.com/humbug/baa

This provisioning endpoint returns unsigned `.plist` configuration
payloads — accepted without cryptographic verification or source
authentication.

An attacker positioned on the network (or in any upstream infrastructure
path) can inject arbitrary XML configuration data that SetupAssistant
will silently process. These changes persist through reboot and affect
system trust, network behavior, and identity provisioning — *before any
user touches the screen.*

------------------------------------------------------------------------
Context
------------------------------------------------------------------------

This disclosure is based on forensic reconstruction of a **real-world
attack observed in the wild**.

These files were extracted from a live device that exhibited
compromise behavior during initial activation. The artifacts presented
here are part of a post-event forensic reconstruction — **not
simulated**, emulated, or crafted artificially.

The compromise occurred during normal SetupAssistant operation, with
no jailbreak, developer tools, or device modifications present.

------------------------------------------------------------------------
Tested Device
------------------------------------------------------------------------

- iPhone running iOS 18.5 (latest as of June 2025)
- Restored to factory settings
- Activated using standard consumer setup flow
- No MDM enrollment or dev profile present

------------------------------------------------------------------------
Impact
------------------------------------------------------------------------

- Remote injection of provisioning configuration before user control
- Persistent `.plist` file modifications affecting:
- Cloud identity frameworks
- Trust and network defaults
- Activation and Apple service behaviors
- System logs show `.plist` entries written and processed before setup
- **Other `.plist` files** can be similarly injected and silently applied
- All occurs pre-setup, pre-consent, and without user awareness

This undermines trust in the provisioning path for:
- Consumers
- Enterprises
- Regulated and government environments

Relevant regulatory exposure includes:
- GDPR / CCPA (privacy violations before consent)
- CMMC 2.0 / NIST 800-171 (loss of provisioning integrity)
- FedRAMP / FISMA (unauthenticated system configuration)

------------------------------------------------------------------------
Technical Summary
------------------------------------------------------------------------

- SetupAssistant connects to `humb.apple.com/humbug/baa` during activation
- This endpoint returns a `.plist` (XML) payload
- Payload is **not signed, not authenticated, and not verified**
- Device accepts and applies it as system configuration
- The following were observed:
- `mobileactivationd.log`: full provisioning POST/response
- `com.apple.bird.plist`: persisted identity config before user input
- Other config files can be similarly injected and silently accepted

------------------------------------------------------------------------
Artifacts
------------------------------------------------------------------------

Attached:
1. `mobileactivationd.log` — provisioning session from activation
2. `com.apple.bird.plist` — identity-related configuration written pre-setup

These files are **unaltered and timestamped**, captured from a real device
during activation after observed anomalous behavior.

------------------------------------------------------------------------
Recommendations
------------------------------------------------------------------------

- Enforce digital signature checks for activation payloads
- Require authentication and origin validation for provisioning endpoints
- Apply strict XML schema validation to all `.plist` responses
- Halt logging of identity-related configuration during SetupAssistant
- Release urgent patch (iOS 18.5.1) to harden client-side provisioning logic

------------------------------------------------------------------------
Timeline
------------------------------------------------------------------------

May 19, 2025 Reported to Apple and US-CERT
June 23, 2025 US-CERT opened case VU#346053
June 26, 2025 Public disclosure

------------------------------------------------------------------------
Researcher
------------------------------------------------------------------------

Joseph Raymond Goydish II

------------------------------------------------------------------------
Download attachment "mobileactivationd log .pdf" of type "application/pdf" (94412 bytes)

Download attachment "com.apple.bird.pdf" of type "application/pdf" (20679 bytes)

_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: https://seclists.org/fulldisclosure/

Powered by blists - more mailing lists